Punctured Reed-Muller code-based McEliece cryptosystems
نویسندگان
چکیده
The authors propose new McEliece cryptosystems based on punctured Reed–Muller (RM) codes. They successfully show that the commonly known attacks, such as the Minder–Shokrollahi attack, the Chizhov–Borodin attack, and the square code attack, are ineffective against the proposed RM code-based McEliece cryptosystem. We developed an optimal puncturing scheme to prevent the above-mentioned attacks for the proposed RM code-based cryptosystems in a sense that the exact locations of puncturing positions with the minimum number of punctured columns of the generator matrix should be found for attacking. It is important to carry out the minimum number of punctures, however, as code modification resulting from puncturing can reduce security. Additionally, the square code attack can be prevented in the proposed RM code-based McEliece cryptosystems by using both the proposed puncturing method and random insertion methods.
منابع مشابه
The failure of McEliece PKC based on Reed-Muller codes
This paper describes new algorithm for breaking McEliece cryptosystem, built on ReedMuller binary code RM(r,m), which receives the private key from the public key. The algorithm has complexity O(n+nlog2n) bit operations, where n = 2, d = GCD(r,m−1). In the case of GCD(r,m − 1) limitation, attack has polynomial complexity. Practical results of implementation show that McEliece cryptosystems, bas...
متن کاملQuantum Fourier sampling, Code Equivalence, and the quantum security of the McEliece and Sidelnikov cryptosystems
The Code Equivalence problem is that of determining whether two given linear codes are equivalent to each other up to a permutation of the coordinates. This problem has a direct reduction to a nonabelian hidden subgroup problem (HSP), suggesting a possible quantum algorithm analogous to Shor’s algorithms for factoring or discrete log. However, in Dinh et al. [2011] we showed that in many cases ...
متن کاملThe failure of McEliece PKC based on Reed - Muller codes . May 8 , 2013
This paper describes new algorithm for breaking McEliece cryptosystem, built on ReedMuller binary code RM(r,m), which receives the private key from the public key. The algorithm has complexity O(n+nlog2n) bit operations, where n = 2, d = GCD(r,m−1). In the case of GCD(r,m − 1) limitation, attack has polynomial complexity. Practical results of implementation show that McEliece cryptosystems, bas...
متن کاملAnother Generalization of the Reed-Muller Codes
The punctured binary Reed-Muller code is cyclic and was generalized into the punctured generalized ReedMuller code over GF(q) in the literature. The major objective of this paper is to present another generalization of the punctured binary Reed-Muller code. Another objective is to construct a family of reversible cyclic codes that are related to the newly generalized Reed-Muller codes. Index Te...
متن کاملA New Signature Scheme Based on Punctured Reed-Muller Code With Random Insertion
In this paper, we propose a new signature scheme based on a punctured Reed–Muller (RM) code with random insertion, which improves the Goppa code-based signature scheme developed by Courtois, Finiasz, and Sendrier (CFS). The CFS signature scheme has certain drawbacks in terms of scaling of the parameters and a lack of existential unforgeability under adaptive chosen message attacks (EUF-CMA) sec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IET Communications
دوره 11 شماره
صفحات -
تاریخ انتشار 2017