Code-Based Cryptosystems Using Generalized Concatenated Codes

نویسندگان

  • Sven Puchinger
  • Sven Müelich
  • Karim Ishak
  • Martin Bossert
چکیده

Public-key cryptosystems nowadays are mostly based on number theoretic problems like factorization (RSA) and the discrete logarithm problem (Elgamal). However, such systems can be broken with quantum computers by applying Shor’s algorithms [1] for solving both problems, factorization and discrete logarithm, in polynomial time. Hence there is a need for post-quantum cryptography, i.e., methods resisting quantum computers. Code-based cryptography, introduced by McEliece in 1978 [2], is one of these candidates. In the original work, the McEliece cryptosystem uses Goppa codes. Ongoing research work is investigating other classes of codes for use in this cryptosystem. Code-based cryptosystems based on Ordinary Concatenated (OC) codes were suggested by Nicolas Sendrier in [3]. OC codes are characterized by a lower decoding complexity than non-concatenated codes. However, in order to reach the same level of security as the original cryptosystem, systems based on OC codes require larger key sizes than the ones based on Goppa codes. Generalized Concatenated (GC) codes also have the advantage of low decoding complexity at the cost of possessing larger key sizes. As explained in [4], comparing a GC and an OC code with the same number of codewords, a GC code has a larger minimum distance. On the other hand, when they both have the same minimum distance, a GC code has more codewords. In [3, 5], it is shown that the structure of a randomly permuted OC code could be discovered. A cryptosystem using OC codes, can then be attacked through obtaining the structure of the inner and outer codes from the public generator matrix. The attack consists of three main steps. The first step is based on identifying the positions of the inner code blocks. The second step orders the positions of the elements of the inner code blocks with respect to each other. Finally, in the third step, a generator matrix for an equivalent inner code is obtained. Moreover, a generator matrix of a π-equivalent outer code is also obtained, where π symbolizes the Frobenius field automorphism and also any power of π results in a field automorphism. After obtaining the structures of the inner and outer codes, already known attacks could be applied to each of them in order to break the whole system. In this work, code-based cryptosystems using GC codes are analyzed in light of Sendrier’s attack [3, 5]. If a GC code could be converted to an OC code, the attack

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes

Physical Unclonable Functions can be used for secure key generation in cryptographic applications. It is explained how methods from coding theory must be applied in order to ensure reliable key regeneration. Based on previous work, we show ways how to obtain better results with respect to error probability and codeword length. Also, an example based on Generalized Concatenated codes is given, w...

متن کامل

On the Decoding of Certain Generalized Concatenated Convolutional Codes

Concatenated Convolutional Codes Jung-Fu Cheng [email protected] Abstract Two classes of generalized concatenated (GC) codes with convolutional outer codes are studied. The rst class is based on the classical Plotkin ja bjbj construction. A new suboptimal multi-stage soft decision algorithm is proposed and the corresponding performance bounds are obtained. These codes are shown to achieve...

متن کامل

A Note on Performance of Generalized Tail Biting Trellis Codes

Tail biting trellis codes and block concatenated codes are discussed from random coding arguments. Error exponents and decoding complexity for generalized tail biting (GTB) random trellis codes, and their relationships are derived, where the GTB trellis codes consist of full tail biting (FTB) trellis codes, partial tail biting (PTB) trellis codes and direct truncated (DT) trellis codes. We show...

متن کامل

Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity

In this correspondence, constructions of generalized concatenated (GC) codes with good rates and distances are presented. Some of the proposed GC codes have simpler trellis complexity than Euclidean geometry (EG), Reed–Muller (RM), or Bose–Chaudhuri–Hocquenghem (BCH) codes of approximately the same rates and minimum distances, and in addition can be decoded with trellis-based multistage decodin...

متن کامل

Analysis, Design, and Iterative Decoding of Double Serially Concatenated Codes with Interleavers

A double serially concatenated code with two interleaves consists of the cascade of an outer encoder, an interleaver permuting the outer codeword bits, a middle encoder, another interleaver permuting the middle codeword bits and an inner encoder whose input words are the permuted middle codewords. The construction can be generalized to h cascaded encoders separated by h – 1 interleavers, where ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1511.08413  شماره 

صفحات  -

تاریخ انتشار 2015