1988
DOI: 10.1007/3-540-45961-8_25
|View full text |Cite
|
Sign up to set email alerts
|

An Observation on the Security of McEliece’s Public-Key Cryptosystem

Abstract: The best known cryptanalytic attack on McEliece's public-key cryptosystem based on algebraic coding theory is to repeatedly select k bits at random from an n-bit ciphertext vector, which is corrupted by at most f errors, in hope that none of the selected k bits are in error until the cryptanalyst recovers the correct message. The method of determining whether the recovered message is the correct one has not been throughly investigated. In this paper, we suggest a systematic method of checking, and describe a g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
144
0
4

Year Published

1990
1990
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 198 publications
(148 citation statements)
references
References 3 publications
(2 reference statements)
0
144
0
4
Order By: Relevance
“…The first assumption is enforced by complexity theory results [3,2,16], and by extensive research on general purpose decoders [7,18,4]. The second assumption received less attention.…”
Section: A Brief Description Of Mceliece's and Niederreiter's Schemesmentioning
confidence: 99%
“…The first assumption is enforced by complexity theory results [3,2,16], and by extensive research on general purpose decoders [7,18,4]. The second assumption received less attention.…”
Section: A Brief Description Of Mceliece's and Niederreiter's Schemesmentioning
confidence: 99%
“…Even if z k = 0, m can be recovered by guessing z k among small Hamming weights [15] (we call this the generalized information-set-decoding (GISD) attack). The correctness of the recovered plaintext m is verifiable by checking whether the Hamming weight of c ⊕ mG is t or not.…”
Section: Non-critical Attacksmentioning
confidence: 99%
“…if A distinguishes b for any combinations of Hashz and Gen, the fault must be in the conversion structure. (16) from (12), (14) and (15). The number of steps of B is at most t + (T Dec + T G ) · q G + T H · q H where T Dec is the number of steps for decrypting the original McEliece PKC using a new query to Gen asz, T G is both for checking whether a query to Gen is new or not and for returning the corresponding value, and T H is both for checking whether a query to Hash z is new or not and for returning the corresponding value.…”
Section: Definition 1 Let Askg Denote the Event Thatz Is Asked Tomentioning
confidence: 99%
See 1 more Smart Citation
“…Both problems are NP-hard. Moreover SD have withstood more than 20 years of extensive research on the cryptanalysis of the McEliece cryptosystem [22] and all the known attacks for SD are still exponential, [1,3,21,36,40]. MinRank in fact contains SD and thus is also probably exponential.…”
Section: Introductionmentioning
confidence: 99%