Wild McEliece Incognito

نویسندگان

  • Daniel J. Bernstein
  • Tanja Lange
  • Christiane Peters
چکیده

The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of security against all attacks known. However, the cryptosystem drops one of the confidence-inspiring shields built into the original McEliece cryptosystem, namely a large pool of Goppa polynomials to choose from. This paper shows how to achieve almost all of the same reduction in key size while preserving this shield. Even if support splitting could be (1) generalized to handle an unknown support set and (2) sped up by a square-root factor, polynomial-searching attacks in the new system will still be at least as hard as information-set decoding. Furthermore, this paper presents a set of concrete cryptanalytic challenges to encourage the cryptographic community to study the security of code-based cryptography. The challenges range through codes over F2,F3, . . . ,F32, and cover two different levels of how much the wildness is hidden.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tinea incognito simulating dermatitis herpetiformis: An unusual case report

Tinea incognito is a dermatophyte infection of the skin with an atypical presentation attributed to inappropriate treatment with immunosuppressive medications. In thi

متن کامل

Implementation of Bitmap Based Incognito and Performance Evaluation

In the era of the Internet, more and more privacy-sensitive data is published online. Even though this kind of data are published with sensitive attributes such as name and social security number removed, the privacy can be revealed by joining those data with some other external data. This technique is called joining attack. Among many techniques developed against the joining attack, the k-anon...

متن کامل

An epidemiological study of syphilis incognito, an emerging public health problem in Greece.

BACKGROUND Syphilis incognito is a subtype of latent syphilis (early or late) characterized by no signs or symptoms of primary or secondary syphilis and diagnosed by positive serologic results for syphilis during routine screening. OBJECTIVE To study the epidemiological characteristics, causes, and implications of syphilis incognito in Greece. PATIENTS AND METHODS All new adult patients dia...

متن کامل

Tinea incognito Caused by Microsporum gypseum in a Patient with Advanced HIV Infection: A Case Report

The prevalence and the clinical relevance of dermatophytoses in HIV-infected patients are poorly documented, particularly for those caused by tinea incognito. Here, we report a case of widespread facial tinea incognito occurring in an Italian patient with advanced HIV infection, showing both skin and brain lesions. Second-line treatment with liposomal amphotericin B and cotrimoxazole, administe...

متن کامل

Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware

In this work, we describe the first implementation of an information set decoding (ISD) attack against code-based cryptosystems like McEliece or Niederreiter using special-purpose hardware. We show that in contrast to other ISD attacks due to Lee and Brickel [7], Leon [8], Stern [15] and recently [9] (May et al.) and [2] (Becket et al.), reconfigurable hardware requires a different implementati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011