Two modifications for Loidreau’s code-based cryptosystem

نویسندگان

چکیده

This paper presents two modifications for Loidreau’s cryptosystem, a rank metric-based cryptosystem constructed by using Gabidulin codes in the McEliece setting. Recently polynomial-time key recovery attack was proposed to break this some cases. To prevent attack, we propose use of subcodes disguise secret Modification I. In II, choose random matrix low column mix with matrix. Our analysis shows that these can both resist existing structural attacks. Furthermore, have much more compact representation public keys compared Classic McEliece, which has been selected into fourth round NIST-PQC project.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Code-Based Key Encapsulation from McEliece's Cryptosystem

In this paper we show that it is possible to extend the framework of Persichetti’s Nierreiter-based KEM [11] and create a secure KEM based on the McEliece protocol. This provides greater flexibility in the application of coding theory as a basis for cryptographic purposes.

متن کامل

An MQ/Code Cryptosystem Proposal

We describe a new trap-door (and PKC) proposal. The proposal is “multivariate quadratic” (relies on the hardness of solving systems of quadratic equations); it is also code-based, and uses the code-scrambling technique of McEliece (1978). However, in the new proposal, the errorcorrecting code is not revealed in the public key, which protects against the leading attacks on McEliece’s method.

متن کامل

Building code modifications for enhanced resiliency

Stephen S. Szoke, P.E., LEED/AP, FACI Director, Codes and Standards Portland Cement Association 5420 Old Orchard Road, Skokie, IL 60077 +1-847-972-9078 [email protected] Stephen V. Skalko, P.E. Manager, Regional Code Services Portland Cement Association 128 Summerfield Drive, Macon, GA 31210 +1-478-477-5028 [email protected] A paper presented at the April 23-25, 2012 The Infrastructure Security...

متن کامل

Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem

In this paper we break a knapsack based two-lock cryptosystem proposed at ICICS’03 [7]. The two-lock cryptosystem is a commutative encryption algorithm that is very useful for the construction of the general t-out-of-n oblivious transfers and millionaire protocol. However, our analysis shows that the proposed knapsack based two-lock cryptosystem is extremely insecure. The serious flaw is that t...

متن کامل

New Public-Key Cryptosystem Based on Two-Dimension DLP

The asymmetric cryptosystem plays an important role in the cryptology nowadays. It is widely used in the fields of data encryption, digital watermarking, digital signature, secure network protocol, etc. However, with the improvement of computing capability, longer and longer the key length is required to ensure the security of interaction information. To shorten the key length and improve the e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applicable Algebra in Engineering, Communication and Computing

سال: 2022

ISSN: ['1432-0622', '0938-1279']

DOI: https://doi.org/10.1007/s00200-022-00577-0