McEliece in the world of Escher

نویسندگان

  • Danilo Gligoroski
  • Simona Samardjiska
  • Håkon Jacobsen
  • Sergey Bezzateev
چکیده

1 Department of Telematics, Norwegian University of Science and Technology (NTNU), Trondheim, NORWAY, {danilog, simonas, hakoja}@item.ntnu.no 2 “Ss Cyril and Methodius” University, Faculty of Computer Science and Engineering (FINKI), Skopje, MACEDONIA [email protected] 3 Saint Petersburg State University of Aerospace Instrumentation, Saint Petersburg, RUSSIA, [email protected] Abstract. We present a new family of linear binary codes of length n and dimension k accompanied with a fast list decoding algorithm that can correct up to n2 errors in a bounded channel with an error density ρ. The decisional problem of decoding random codes using these generalized error sets is NP-complete. Next we use the properties of these codes to design both an encryption scheme and a signature scheme. Although in the open literature there have been several proposals how to produce digital signatures from the McEliece public key scheme, as far as we know, this is the first public key scheme based on codes where signatures are produced in a straightforward manner from the decryption procedure of the scheme. The security analysis of our scheme have four parts: 1. An extensive list of attacks using the Information Set Decoding techniques adopted for our codes; 2. An analysis of the cost of a distinguishing attack based on rank attacks on the generator matrix of the code or on its dual code; 3. An analysis of the cost of cheap distinguishing attacks on the generator matrix of the code or on its dual code that have expensive list-decoding properties; 4. We interpret our scheme as multivariate quadratic system and discuss difficulties of solving that system using algebraic approaches such as Gröbner bases. Based on this security analysis we suggest some concrete parameters for the security levels in the range of 280−2128. An additional feature of the decryption process is that it admits massive and trivial parallelization that could potentially make our scheme in hardware as fast as the symmetric crypto primitives.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerabilities of "McEliece in the World of Escher"

Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern based on “generalized error sets.” The general approach was referred to as McEliece in the World of Escher. This paper demonstrates attacks which are significantly cheaper than the claimed security level of the parameters given b...

متن کامل

Fault injection's sensitivity of the McEliece PKC

The McEliece public key cryptosystem (PKC) is supposed secure in a post quantum world [2] because there is no e cient quantum algorithm for the underlying problems, which this cryptosystem is built upon. The purpose of this article is to describe in what the structure of the McEliece PKC is sensitive to fault injection. We present the injection fault in the McEliece scheme using Goppa codes and...

متن کامل

Interactive 3D Simulation of Escher-like Impossible Worlds

Maurits Cornelis Escher (1898-1972) is a famous Dutch artist known – amongst others – for his prints of impossible figures and impossible worlds. Many of his works illustrate mathematical and geometrical concepts such as perspective and limits. Works by Escher have motivated scientists over the years to discover the mathematical foundations of his work, ultimately leading to applications that a...

متن کامل

Study of McEliece cryptosystem

This report presents a study of the public-key cryptosystem (PKC) proposed by R. J. McEliece in 1978 [25]. The McEliece cryptosystem is based on error-correcting linear codes and is one of the first and so far the most succesful cryptosystem based on notions of coding theory. The original construction in [25] uses binary Goppa codes to encrypt and decrypt messages. Many other variants of the cr...

متن کامل

Take a Stroll in Another World

Another World II is a print by the famous Dutch artist M. C. Escher, depicting a cube with arch-like openings on each side. What makes the print interesting is that the depicted views in the arches are inconsistent, leaving the spectator puzzled as to the " impossible assembly " of views from different perspectives. In our work we invite the reader – and more so, the user of our software – to e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014