Two modifications for Loidreau’s code-based cryptosystem
نویسندگان
چکیده
This paper presents two modifications for Loidreau’s cryptosystem, a rank metric-based cryptosystem constructed by using Gabidulin codes in the McEliece setting. Recently polynomial-time key recovery attack was proposed to break this some cases. To prevent attack, we propose use of subcodes disguise secret Modification I. In II, choose random matrix low column mix with matrix. Our analysis shows that these can both resist existing structural attacks. Furthermore, have much more compact representation public keys compared Classic McEliece, which has been selected into fourth round NIST-PQC project.
منابع مشابه
Code-Based Key Encapsulation from McEliece's Cryptosystem
In this paper we show that it is possible to extend the framework of Persichetti’s Nierreiter-based KEM [11] and create a secure KEM based on the McEliece protocol. This provides greater flexibility in the application of coding theory as a basis for cryptographic purposes.
متن کاملAn MQ/Code Cryptosystem Proposal
We describe a new trap-door (and PKC) proposal. The proposal is “multivariate quadratic” (relies on the hardness of solving systems of quadratic equations); it is also code-based, and uses the code-scrambling technique of McEliece (1978). However, in the new proposal, the errorcorrecting code is not revealed in the public key, which protects against the leading attacks on McEliece’s method.
متن کاملBuilding code modifications for enhanced resiliency
Stephen S. Szoke, P.E., LEED/AP, FACI Director, Codes and Standards Portland Cement Association 5420 Old Orchard Road, Skokie, IL 60077 +1-847-972-9078 [email protected] Stephen V. Skalko, P.E. Manager, Regional Code Services Portland Cement Association 128 Summerfield Drive, Macon, GA 31210 +1-478-477-5028 [email protected] A paper presented at the April 23-25, 2012 The Infrastructure Security...
متن کاملCryptanalysis of a Knapsack Based Two-Lock Cryptosystem
In this paper we break a knapsack based two-lock cryptosystem proposed at ICICS’03 [7]. The two-lock cryptosystem is a commutative encryption algorithm that is very useful for the construction of the general t-out-of-n oblivious transfers and millionaire protocol. However, our analysis shows that the proposed knapsack based two-lock cryptosystem is extremely insecure. The serious flaw is that t...
متن کاملNew Public-Key Cryptosystem Based on Two-Dimension DLP
The asymmetric cryptosystem plays an important role in the cryptology nowadays. It is widely used in the fields of data encryption, digital watermarking, digital signature, secure network protocol, etc. However, with the improvement of computing capability, longer and longer the key length is required to ensure the security of interaction information. To shorten the key length and improve the e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applicable Algebra in Engineering, Communication and Computing
سال: 2022
ISSN: ['1432-0622', '0938-1279']
DOI: https://doi.org/10.1007/s00200-022-00577-0