Global Information Lookup Global Information

McEliece cryptosystem information


In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.[1] It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance in the cryptographic community, but is a candidate for "post-quantum cryptography", as it is immune to attacks using Shor's algorithm and – more generally – measuring coset states using Fourier sampling.[2]

The algorithm is based on the hardness of decoding a general linear code (which is known to be NP-hard[3]). For a description of the private key, an error-correcting code is selected for which an efficient decoding algorithm is known, and which is able to correct errors. The original algorithm uses binary Goppa codes (subfield codes of algebraic geometry codes of a genus-0 curve over finite fields of characteristic 2); these codes can be efficiently decoded, thanks to an algorithm due to Patterson.[4] The public key is derived from the private key by disguising the selected code as a general linear code. For this, the code's generator matrix is perturbated by two randomly selected invertible matrices and (see below).

Variants of this cryptosystem exist, using different types of codes. Most of them were proven less secure; they were broken by structural decoding.

McEliece with Goppa codes has resisted cryptanalysis so far. The most effective attacks known use information-set decoding algorithms. A 2008 paper describes both an attack and a fix.[5] Another paper shows that for quantum computing, key sizes must be increased by a factor of four due to improvements in information set decoding.[6]

The McEliece cryptosystem has some advantages over, for example, RSA. The encryption and decryption are faster.[7] For a long time, it was thought that McEliece could not be used to produce signatures. However, a signature scheme can be constructed based on the Niederreiter scheme, the dual variant of the McEliece scheme. One of the main disadvantages of McEliece is that the private and public keys are large matrices. For a standard selection of parameters, the public key is 512 kilobits long.

  1. ^ McEliece, Robert J. (1978). "A Public-Key Cryptosystem Based on Algebraic Coding Theory" (PDF). DSN Progress Report. 44: 114–116. Bibcode:1978DSNPR..44..114M.
  2. ^ Dinh, Hang; Moore, Cristopher; Russell, Alexander (2011). Rogaway, Philip (ed.). McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks. Advances in cryptology—CRYPTO 2011. Lecture Notes in Computer Science. Vol. 6841. Heidelberg: Springer. pp. 761–779. doi:10.1007/978-3-642-22792-9_43. ISBN 978-3-642-22791-2. MR 2874885.
  3. ^ Berlekamp, Elwyn R.; McEliece, Robert J.; Van Tilborg, Henk C.A. (1978). "On the Inherent Intractability of Certain Coding Problems". IEEE Transactions on Information Theory. IT-24 (3): 384–386. doi:10.1109/TIT.1978.1055873. MR 0495180.
  4. ^ N. J. Patterson (1975). "The algebraic decoding of Goppa codes". IEEE Transactions on Information Theory. IT-21 (2): 203–207. doi:10.1109/TIT.1975.1055350.
  5. ^ Bernstein, Daniel J.; Lange, Tanja; Peters, Christiane (8 August 2008). "Attacking and Defending the McEliece Cryptosystem". Post-Quantum Cryptography. Lecture Notes in Computer Science. Vol. 5299. pp. 31–46. CiteSeerX 10.1.1.139.3548. doi:10.1007/978-3-540-88403-3_3. ISBN 978-3-540-88402-6.
  6. ^ Bernstein, Daniel J. (2010). Sendrier, Nicolas (ed.). Grover vs. McEliece (PDF). Post-quantum cryptography 2010. Lecture Notes in Computer Science. Vol. 6061. Berlin: Springer. pp. 73–80. doi:10.1007/978-3-642-12929-2_6. ISBN 978-3-642-12928-5. MR 2776312.
  7. ^ "eBATS: ECRYPT Benchmarking of Asymmetric Systems". bench.cr.yp.to. 25 August 2018. Retrieved 1 May 2020.

and 19 Related for: McEliece cryptosystem information

Request time (Page generated in 0.8019 seconds.)

McEliece cryptosystem

Last Update:

In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece. It was the first such scheme to...

Word Count : 2092

List of cryptosystems

Last Update:

Lattice-based cryptography McEliece cryptosystem Multivariate cryptography Isogeny-based cryptography Corinne Bernstein. "cryptosystem". TechTarget.com. Retrieved...

Word Count : 120

Robert McEliece

Last Update:

1978.1055873 McEliece cryptosystem "Robert J. McEliece, 1942–2019". Caltech. Retrieved January 7, 2020. "In Memoriam: Robert J. McEliece". IEEE Information...

Word Count : 412

ElGamal encryption

Last Update:

free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm (DSA) is a variant of the ElGamal signature...

Word Count : 1477

Paillier cryptosystem

Last Update:

The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The...

Word Count : 1929

Niederreiter cryptosystem

Last Update:

In cryptography, the Niederreiter cryptosystem is a variation of the McEliece cryptosystem developed in 1986 by Harald Niederreiter. It applies the same...

Word Count : 675

Rabin cryptosystem

Last Update:

The Rabin cryptosystem is a family of public-key encryption schemes based on a trapdoor function whose security, like that of RSA, is related to the difficulty...

Word Count : 2399

Binary Goppa code

Last Update:

codes have interesting properties suitable for cryptography in McEliece-like cryptosystems and similar setups. An irreducible binary Goppa code is defined...

Word Count : 1154

Quantum computing

Last Update:

Shor's algorithm applies, like the McEliece cryptosystem based on a problem in coding theory. Lattice-based cryptosystems are also not known to be broken...

Word Count : 12492

Benaloh cryptosystem

Last Update:

The Benaloh Cryptosystem is an extension of the Goldwasser-Micali cryptosystem (GM) created in 1985 by Josh (Cohen) Benaloh. The main improvement of the...

Word Count : 751

Threshold cryptosystem

Last Update:

A threshold cryptosystem, the basis for the field of threshold cryptography, is a cryptosystem that protects information by encrypting it and distributing...

Word Count : 868

Error correction code

Last Update:

Binary Golay code is of practical interest Goppa code, used in the McEliece cryptosystem Hadamard code Hagelbarger code Hamming code Latin square based code...

Word Count : 4679

Outline of cryptography

Last Update:

EPOC Kyber Merkle–Hellman knapsack cryptosystem – knapsack scheme McEliece cryptosystem Niederreiter cryptosystem NTRUEncrypt RSA – factoring RSA-KEM...

Word Count : 1876

Timeline of cryptography

Last Update:

1977 – RSA public key encryption invented. 1978 – Robert McEliece invents the McEliece cryptosystem, the first asymmetric encryption algorithm to use randomization...

Word Count : 2064

Digital Signature Algorithm

Last Update:

The Digital Signature Algorithm (DSA) is a public-key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical...

Word Count : 2147

Hidden Field Equations

Last Update:

Equations (HFE), also known as HFE trapdoor function, is a public key cryptosystem which was introduced at Eurocrypt in 1996 and proposed by (in French)...

Word Count : 2480

Kyber

Last Update:

in the transmission system being able to decrypt it. This asymmetric cryptosystem uses a variant of the learning with errors lattice problem as its basic...

Word Count : 1471

Index of cryptography articles

Last Update:

Hellman • MaruTukku • Massey–Omura cryptosystem • Matt Blaze • Matt Robshaw • Max Newman • McEliece cryptosystem • mcrypt • MD2 (cryptography) • MD4...

Word Count : 2943

RSA problem

Last Update:

developed, it would threaten the current or eventual security of RSA-based cryptosystems—both for public-key encryption and digital signatures. More specifically...

Word Count : 681

PDF Search Engine © AllGlobal.net