Modified GPT Cryptosystem for Information Network Security
نویسندگان
چکیده
منابع مشابه
Modified GPT Cryptosystem for Information Network Security
To provide information security in network we use the public key GPT (Gabidulin–Paramonov–Tretiyakov) cryptosystem based on rank codes. This cryptosystem was the subject of several attacks. Some of them were structural attacks, others were decoding attacks. In our opinion the most dangerous are structural attacks because decoding attacks can be prevented by proper choice of parameters. To preve...
متن کاملModified Niederreiter type of GPT cryptosystem based on reducible rank codes
GPT public key cryptosystem was proposed by Gabidulin, Paramonov and Tretjakov in 1991. This cryptosystem is based on rank error correcting codes. The main advantage of using rank codes in cryptography is that, it has smaller key size as compared to other code based public key cryptosystems. Several attacks against this system were published and some modifications were also proposed withstandin...
متن کاملModified Montgomery for RSA Cryptosystem
Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a Modified Montgomery Modular Multiplication in which addition of operands is computed by 4:2 compressor. The basic logic operations in addition are partitio...
متن کاملDecoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
In this paper we view interleaved Gabidulin codes and describe how to correct errors up to a rank equal to the amount of redundancy of the code with high probability. We give a detailed proof for our estimation of the probability of correct decoding. In a second part, we view the application to variants of the GPT cryptosystem. For GGPT this leads to an efficient attack on the remaining secure ...
متن کاملHot Topics: Information Retrieval for Network Security
Topic modeling is performed on 12 million firewall log entries to depict changes in the network over time.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Information Security Research
سال: 2014
ISSN: 2042-4639
DOI: 10.20533/ijisr.2042.4639.2014.0050