Code-based cryptosystems using generalized concatenated codes

Sven Puchinger, Sven Müelich, Karim Ishak, Martin Bossert

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

4 Zitate (Scopus)

Abstract

The security of public-key cryptosystems is mostly based on number-theoretic problems like factorization and the discrete logarithm. There exists an algorithm which solves these problems in polynomial time using a quantum computer. Hence, these cryptosystems will be broken as soon as quantum computers emerge. Code-based cryptography is an alternative which resists quantum computers since its security is based on an NP-complete problem, namely decoding of random linear codes. The McEliece cryptosystem is the most prominent scheme to realize code-based cryptography. Many code classes were proposed for the McEliece cryptosystem, but most of them are broken by now. Sendrier suggested to use ordinary concatenated codes, however, he also presented an attack on such codes. This work investigates generalized concatenated codes to be used in the McEliece cryptosystem. We examine the application of Sendrier’s attack on generalized concatenated codes and present alternative methods for both partly finding the code structure and recovering the plaintext from a cryptogram. Further, we discuss modifications of the cryptosystem making it resistant against these attacks.

OriginalspracheEnglisch
TitelApplications of Computer Algebra
Redakteure/-innenIlias S. Kotsireas, Edgar Martinez-Moro
Herausgeber (Verlag)Springer New York LLC
Seiten397-423
Seitenumfang27
ISBN (Print)9783319569307
DOIs
PublikationsstatusVeröffentlicht - 2017
Extern publiziertJa
Veranstaltung21st International Conference on Applications of Computer Algebra, ACA 2015 - Kalamata, Griechenland
Dauer: 20 Juli 201523 Juli 2015

Publikationsreihe

NameSpringer Proceedings in Mathematics and Statistics
Band198
ISSN (Print)2194-1009
ISSN (elektronisch)2194-1017

Konferenz

Konferenz21st International Conference on Applications of Computer Algebra, ACA 2015
Land/GebietGriechenland
OrtKalamata
Zeitraum20/07/1523/07/15

Fingerprint

Untersuchen Sie die Forschungsthemen von „Code-based cryptosystems using generalized concatenated codes“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren