2015
DOI: 10.1007/s10623-015-0099-x
|View full text |Cite
|
Sign up to set email alerts
|

Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

Abstract: We present a general purpose algorithm for finding low-weight codewords as well as for decoding a received codeword in any quasi-cyclic code whose length and dimension is a multiple of a power of 2. In this paper, we apply the algorithm on a McEliece variant recently proposed by Misoczki et al. (MDPC-McEliece: New McEliece variants from moderate density parity-check codes, 2013). In their paper, the authors present instances of LDPC codes with increased weight for use in a McEliece type PKC. They claim that al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 19 publications
(43 reference statements)
0
13
0
Order By: Relevance
“…where ε PSSI + is the bound on the successful probability that the PPT adversary solves the PSSI + problem. (1) To avoid attacks [31,[37][38][39] and according to [28], m and n must be two different primes, and…”
Section: Proof Of Securitymentioning
confidence: 99%
“…where ε PSSI + is the bound on the successful probability that the PPT adversary solves the PSSI + problem. (1) To avoid attacks [31,[37][38][39] and according to [28], m and n must be two different primes, and…”
Section: Proof Of Securitymentioning
confidence: 99%
“…According to the characteristics of a dyadic matrix, the first row of each dyadic sub-matrix can generate an entire quasi-dyadic matrix. In this paper, we take the finite field F 2 8 as an example to analyze the efficiency of the novel McEliece cryptosystem. The size of a public key is 8 * , where p is taken from [2 11 , 2 14 ].…”
Section: • Key Size and Bit Ratementioning
confidence: 99%
“…However, the large key size of the original McEliece makes it difficult to be applied in practice on embedded devices with limited resources [4]. Recently, to reduce the key size, some improved McEliece cryptosystems have been developed based on various types of error correcting codes such as the LDPC, MDPC, QC-MDPC, and QD-Goppa codes [5][6][7][8]. Although these improved cryptosystems satisfy the application requirements of embedded devices, they cannot defend against side channel attacks [9].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, we choose r such that 2 is primitive modulo r. First, this will force r to be prime, thwarting the so-called squaring attack [33]. Also, it implies that x r − 1 only has two irreducible factors (one of them being x − 1).…”
Section: How To Choose Mdpc Parametersmentioning
confidence: 99%