Secure and linear cryptosystems using error - correcting codes
نویسندگان
چکیده
(received ; accepted) PACS. .89.90n – Computer science and technology. Abstract. – A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented. The complexity of the encryption and the decryption processes scale linearly with the size of the plaintext Alice sends to Bob. The public-key is pre-corrupted by Bob, whereas a private-noise added by Alice to a given fraction of the ciphertext of each encrypted plaintext serves to increase the secure channel and is the cornerstone for digital signatures and authentication. Various scenarios are discussed including the possible actions of the opponent Oscar as an eavesdropper or as a disruptor. The goal of cryptography is to enable two people, usually referred to as Alice and Bob, to communicate over an insecure channel in such a way that the opponent Oscar cannot understand and decrypt the transmitted message.[1] A block message is called a plaintext, and a long message is a sequence of plaintexts. In a general scenario, the plaintext is encrypted by Alice through the key E k and the result, ciphertext, is sent over the channel. A third party, eavesdropping on the channel, cannot determine what the plaintext was. However, Bob, who knows the encryption key, can decrypt the ciphertext using the key D k and recover the plaintext. In a private-key system, the keys E k and D k are known only to Alice and Bob, and it obviously increases the security of the channel. However, a private-key system requires communication between Alice and Bob prior to the transmission of any plaintext. This prerequisite makes the private-key communication impractical in modern communication, especially in such areas as electronic commerce and Internet-based communication. The goal of public-key systems is to devise a cryptosystem where it is computationally infeasible to determine D k given E k , and hence the encryption rule E k can be made public. The secure channel and the efficiency of a public-key cryptosystem depends on many parameters, among them: (a) the complexity to determine D k given E k ; (b) the complexity of the encryption/decryption processes; (c) the length of the ciphertext and the public-key in comparison to the length of the plaintext. The commonly used RSA cryptosystem[2] is based on the difficulty of factorizing large integers. Its main drawback is that the complexity of the encryption/decryption processes is of O(N 2)/O(N 3), where N is the …
منابع مشابه
Improvements of the Attacks on Cryptosystems Based on Error-correcting Codes Improvements of the Attacks on Cryptosystems Based on Error-correcting Codes Improvements of the Attacks on Cryptosystems Based on Error-correcting Codes
Many public-key cryptosystems and identiication schemes based on error-correcting codes have been proposed as an alternative to the common cryptographic algorithms based on number theory. They rely on the NP-hardness of nding a xed-weight word in a coset of a linear binary code. We here improve the previous attacks on these systems; this notably enables us to reduce the work factor involved in ...
متن کاملA New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
In this paper, we present a new scheme referred to as K(III) scheme which would be effective for improving a certain class of PKC's. Using K(III) scheme, we propose a new method for constructing the public-key cryptosystems based on error-correcting codes. The constructed PKC is referred to as K(V)SE(1)PKC. We also present more secure version of K(V)SE(1)PKC, referred to as K * (V)SE(1)PKC, usi...
متن کاملOne-point Goppa Codes on Some Genus 3 Curves with Applications in Quantum Error-Correcting Codes
We investigate one-point algebraic geometric codes CL(D, G) associated to maximal curves recently characterized by Tafazolian and Torres given by the affine equation yl = f(x), where f(x) is a separable polynomial of degree r relatively prime to l. We mainly focus on the curve y4 = x3 +x and Picard curves given by the equations y3 = x4-x and y3 = x4 -1. As a result, we obtain exact value of min...
متن کاملOn a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first define a new “metric” (with slightly different properties than the standard Hamming metric). Using this metric we define a very particular class of codes that we call error-set correcting codes, based on a set of forbidden distances which is a monotone decreasing set. Next we redefine the packing pro...
متن کاملOn the Security of Some Cryptosystems Based on Error-correcting Codes
A certain number of public-key cryptosystems based on error-correcting codes have been proposed as an alternative to algorithms based on number theory. In this paper, we analyze algorithms that can be used to attack such cryptosystems in a very precise way, and optimize them. Thus, we obtain some more eecient attacks than those previously known. Even if they remain unfeasible, they indicate the...
متن کاملError-correcting pairs for a public-key cryptosystem
Code-based cryptography is an interesting alternative to classic number-theory PKC since it is conjectured to be secure against quantum computer attacks. Many families of codes have been proposed for these cryptosystems, one of the main requirements is having high performance t-bounded decoding algorithms which in the case of having an error-correcting pair is achieved. In this article the clas...
متن کامل