Attacks on Two Digital Signature Schemes Based on Error Correcting Codes
نویسندگان
چکیده
We examine the security of several digital signature schemes based on algebraic block codes. It is shown that Xinmei’s digital signature scheme cau be totally broken by a known plaintext attack with complexity O(k3), where t is the dimension of the code used in the scheme. Harn and Wang have proposed a modified version of Xinmei’s scheme that prevents selective forgeries. Their scheme is also shown to be vulnerable to a known plaintext attack. We then present a new signature scheme that we believe to be resistant to th,: previously described attacks. 1 Xinmei’s Digital Signature Scheme Xinmei’s digital signature scheme [l] attempts to base its security on the intractability of the general decoding problem and the difficulty of factoring large matrices. Each user, say user A, chooses an ( n , k ) binary Goppa code CA that has the ability to correct t A errors. A k X n binary generator matrix GA and an (n k) x n binary parity check matrix HA are selected for CA. User A then finds the n x k binary matrix GI such that GA(;: = I k , where I k is the k x k identity matrix. User A selects a nonsingular binary n x n matrix PA and a nonsingular binary k x k matrix SA. User A completes the set-up of the system by constructing the matrices J A = PLIGASi’, WA = GZS;’, and TA = PYl H,’. The public key consists of J A , WA, TA, H A , t A , and t’, where t’ is an integer such that t’ < CA. The private key consists of the two matrices SAGA and PA. User A obtains the n-bit signature cj of the k-bit message mJ by computing is an n-bit error vector with Hamming weight w 3 ( g j ) = t’ chosen at random by user A. The receiver validates the possibily noise corrupted signature $ through the use of the Berlekamp-Massey algorithm and the public = (gj @ rnjSAGA)PA, where
منابع مشابه
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error– correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the redundancy of public keys. Another weakness is found in the Alabbadi–Wicker scheme, which results in a universal forgery attack agains...
متن کاملIdentity-based identification and signature schemes using correcting codes
In this paper, we propose a new identity-based authentication (and signature) scheme based on error-correcting codes. This scheme is up to date the first identity-based scheme not based on number theory. The scheme combines two well known code-based schemes: the signature scheme of Courtois, Finiasz and Sendrier and the zero-knowledge authentication scheme of Stern (which may also be used for s...
متن کاملImproved identity-based identification using correcting codes
In this paper, a new identity-based identification scheme based on error-correcting codes is proposed. Two well known code-based schemes are combined : the signature scheme by Courtois, Finiasz and Sendrier and an identification scheme by Stern. A proof of security for the scheme in the Random Oracle
متن کاملImprovements of the Attacks on Cryptosystems Based on Error-correcting Codes Improvements of the Attacks on Cryptosystems Based on Error-correcting Codes Improvements of the Attacks on Cryptosystems Based on Error-correcting Codes
Many public-key cryptosystems and identiication schemes based on error-correcting codes have been proposed as an alternative to the common cryptographic algorithms based on number theory. They rely on the NP-hardness of nding a xed-weight word in a coset of a linear binary code. We here improve the previous attacks on these systems; this notably enables us to reduce the work factor involved in ...
متن کاملan Efficient Blind Signature Scheme based on Error Correcting Codes
Cryptography based on the theory of error correcting codes and lattices has received a wide attention in the last years. Shor’s algorithm showed that in a world where quantum computers are assumed to exist, number theoretic cryptosystems are insecure. Therefore, it is important to design suitable, provably secure post-quantum signature schemes. Code-based public key cryptography has the charact...
متن کاملImproving the Watermarking Process With Usage of Block Error-Correcting Codes
The emergence of digital imaging and of digital networks has made duplication of original artwork easier. In order to protect these creations, new methods for signing and copyrighting visual data are needed. Watermarking techniques, also reffered to as digital signature, sign images by introducing changes that are imperceptable to the human eye but easily recovarable by a computer program. Gene...
متن کامل