Wild McEliece Incognito
نویسندگان
چکیده
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of security against all attacks known. However, the cryptosystem drops one of the confidence-inspiring shields built into the original McEliece cryptosystem, namely a large pool of Goppa polynomials to choose from. This paper shows how to achieve almost all of the same reduction in key size while preserving this shield. Even if support splitting could be (1) generalized to handle an unknown support set and (2) sped up by a square-root factor, polynomial-searching attacks in the new system will still be at least as hard as information-set decoding. Furthermore, this paper presents a set of concrete cryptanalytic challenges to encourage the cryptographic community to study the security of code-based cryptography. The challenges range through codes over F2,F3, . . . ,F32, and cover two different levels of how much the wildness is hidden.
منابع مشابه
Tinea incognito simulating dermatitis herpetiformis: An unusual case report
Tinea incognito is a dermatophyte infection of the skin with an atypical presentation attributed to inappropriate treatment with immunosuppressive medications. In thi
متن کاملImplementation of Bitmap Based Incognito and Performance Evaluation
In the era of the Internet, more and more privacy-sensitive data is published online. Even though this kind of data are published with sensitive attributes such as name and social security number removed, the privacy can be revealed by joining those data with some other external data. This technique is called joining attack. Among many techniques developed against the joining attack, the k-anon...
متن کاملAn epidemiological study of syphilis incognito, an emerging public health problem in Greece.
BACKGROUND Syphilis incognito is a subtype of latent syphilis (early or late) characterized by no signs or symptoms of primary or secondary syphilis and diagnosed by positive serologic results for syphilis during routine screening. OBJECTIVE To study the epidemiological characteristics, causes, and implications of syphilis incognito in Greece. PATIENTS AND METHODS All new adult patients dia...
متن کاملTinea incognito Caused by Microsporum gypseum in a Patient with Advanced HIV Infection: A Case Report
The prevalence and the clinical relevance of dermatophytoses in HIV-infected patients are poorly documented, particularly for those caused by tinea incognito. Here, we report a case of widespread facial tinea incognito occurring in an Italian patient with advanced HIV infection, showing both skin and brain lesions. Second-line treatment with liposomal amphotericin B and cotrimoxazole, administe...
متن کاملAttacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware
In this work, we describe the first implementation of an information set decoding (ISD) attack against code-based cryptosystems like McEliece or Niederreiter using special-purpose hardware. We show that in contrast to other ISD attacks due to Lee and Brickel [7], Leon [8], Stern [15] and recently [9] (May et al.) and [2] (Becket et al.), reconfigurable hardware requires a different implementati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011