2013
DOI: 10.1007/978-3-642-38616-9_7
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes

Abstract: Abstract. Löndahl and Johansson proposed last year a variant of the McEliece cryptosystem which replaces Goppa codes by convolutional codes. This modification is supposed to make structural attacks more difficult since the public generator matrix of this scheme contains large parts which are generated completely at random. They proposed two schemes of this kind, one of them consists in taking a Goppa code and extending it by adding a generator matrix of a time varying convolutional code. We show here that this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 31 publications
0
16
0
Order By: Relevance
“…This drawback motivated the search for secure code-based cryptosystems with more manageable key sizes [19,23,29,39]. Unfortunately, most of the proposed McEliece variants using codes other than Goppa codes have turned out to be insecure [14,22,25,27,35,40]. Using QC-MDPC codes to replace Goppa codes in the McEliece cryptosystem was first suggested by Misoczki et al in 2013 [26], and appears to be a promising choice.…”
Section: Previous Related Workmentioning
confidence: 99%
“…This drawback motivated the search for secure code-based cryptosystems with more manageable key sizes [19,23,29,39]. Unfortunately, most of the proposed McEliece variants using codes other than Goppa codes have turned out to be insecure [14,22,25,27,35,40]. Using QC-MDPC codes to replace Goppa codes in the McEliece cryptosystem was first suggested by Misoczki et al in 2013 [26], and appears to be a promising choice.…”
Section: Previous Related Workmentioning
confidence: 99%
“…Moreover, there are some improvements of the CFS scheme [9] by exploiting other code families, such as the LDGM code [10] and the convolutional code [11]. However, these improvements ended in failure [12,13]. In 2014, Gaborit et al [14] proposed the RankSign scheme using the rank metric [15] and the LRPC code [16].…”
Section: Introductionmentioning
confidence: 99%
“…A first version of the scheme based on LDPC codes proposed in [BC07] has been successfully attacked in [OTD08] (but the new scheme proposed in [BBC08] seems to be immune to this kind of attack). Some of the parameters that can be found in [BLP10,BLP11] have been successfully cryptanalyzed with a polynomial time attack in [COT14] or with an exponential time attack in [FPdP14], and finally the convolutional scheme of [LJ12] was successfully cryptanalyzed in [LT13].…”
Section: Introductionmentioning
confidence: 99%
“…All of these attacks (with the exception of [LT13]) pinpoint algebraic properties of the codes which raises the issue of looking for alternative code families with little or no algebraic structure. In this respect the proposals of [SK14,HSEA14] might be very attractive.…”
Section: Introductionmentioning
confidence: 99%