On the security of the McEliece public-key cryptosystern

被引:0
|
作者
Sendrier, N [1 ]
机构
[1] INRIA Rocquencourt, Project CODES, F-78153 Le Chesnay, France
来源
关键词
Public-key cryptography; McEliece cryptosystem; Niedereitter cryptosystem; error correcting codes; Goppa codes; syndrome decoding; proof of security; digital signature;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As RSA, the McEliece public-key cryptosystem has successfully resisted more than 20 years of cryptanalysis effort. However, despite the fact that it is faster, it was not as successful as RSA as far as applications are concerned. This is certainly due to its very large public key and probably also to the belief that the system could not be used for the design of a digital signature scheme. We present here the state of art of the implementation and the security of the two main variants of code-based public-key encryption schemes (McEliece's and Niedereitter's) as well as the more recent signature scheme derived from them. We also show how it is possible to formally reduce the security of these systems to two well identified algorithmic problems. The decoding attack (aimed on one particular ciphertext) is connected to the NP-complete syndrome decoding problem. The structural attack (aimed on the public key) is connected to the problem of distinguishing binary Goppa codes from random codes. We conjecture that both these problems are difficult and present some arguments to support this claim.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [21] On the security of a public-key cryptosystem
    Grosek, O
    Magliveras, SS
    Wei, W
    PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 71 - 75
  • [22] Public-key security systems
    Univ of New Orleans, New Orleans, United States
    IEEE Micro, 3 (10-13):
  • [23] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    IEEE MICRO, 1996, 16 (03) : 10 - 13
  • [24] Enhanced Public Key Security for the McEliece Cryptosystem
    Baldi, Marco
    Bianchi, Marco
    Chiaraluce, Franco
    Rosenthal, Joachim
    Schipani, Davide
    JOURNAL OF CRYPTOLOGY, 2016, 29 (01) : 1 - 27
  • [25] Enhanced Public Key Security for the McEliece Cryptosystem
    Marco Baldi
    Marco Bianchi
    Franco Chiaraluce
    Joachim Rosenthal
    Davide Schipani
    Journal of Cryptology, 2016, 29 : 1 - 27
  • [26] Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Avanzi, Roberto
    Hoerder, Simon
    Page, Dan
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) : 75 - 75
  • [27] Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Avanzi, Roberto
    Hoerder, Simon
    Page, Dan
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 271 - 281
  • [28] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [29] SECURITY OF OKAMOTO PUBLIC-KEY CRYPTOSYSTEM
    KOYAMA, K
    ELECTRONICS LETTERS, 1986, 22 (20) : 1033 - 1034
  • [30] Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Roberto Avanzi
    Simon Hoerder
    Dan Page
    Michael Tunstall
    Journal of Cryptographic Engineering, 2012, 2 (1) : 75 - 75