Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cryptography With Mceliece Algorithm (Code Based Cryptography)

View through CrossRef
Cryptography is the science used to protect information from unauthorized access. One promising cryptographic algorithm is the McEliece algorithm, which uses code-based cryptography. This algorithm was introduced by Robert McEliece in 1978 and is known for its resistance to attacks from quantum computers, which are expected to be able to break most current cryptographic algorithms. The McEliece algorithm uses binary Goppa code for encryption and decryption, offering high execution speed and resistance to various types of attacks. Although one of its main drawbacks is the large public key size, recent developments in research have shown progress in reducing the key size without sacrificing security. This study aims to explore the working mechanism of the McEliece algorithm, analyze its advantages and disadvantages, and discuss its potential applications in modern technology. The results of this study indicate that the McEliece algorithm has great potential in the field of quantum-safe cryptography, with applications ranging from secret communication to secure data storage.
Title: Cryptography With Mceliece Algorithm (Code Based Cryptography)
Description:
Cryptography is the science used to protect information from unauthorized access.
One promising cryptographic algorithm is the McEliece algorithm, which uses code-based cryptography.
This algorithm was introduced by Robert McEliece in 1978 and is known for its resistance to attacks from quantum computers, which are expected to be able to break most current cryptographic algorithms.
The McEliece algorithm uses binary Goppa code for encryption and decryption, offering high execution speed and resistance to various types of attacks.
Although one of its main drawbacks is the large public key size, recent developments in research have shown progress in reducing the key size without sacrificing security.
This study aims to explore the working mechanism of the McEliece algorithm, analyze its advantages and disadvantages, and discuss its potential applications in modern technology.
The results of this study indicate that the McEliece algorithm has great potential in the field of quantum-safe cryptography, with applications ranging from secret communication to secure data storage.

Related Results

Cryptanalysis of McEliece cryptosystem variants based on quasi‐cyclic low‐density parity check codes
Cryptanalysis of McEliece cryptosystem variants based on quasi‐cyclic low‐density parity check codes
One of the approaches to modify the McEliece cryptosystem to overcome its large key size is replacing binary Goppa codes with a new structured code. However, this modification make...
ANALISIS ALIH KODE DAN CAMPUR KODE PADA FILM “SANG PRAWIRA EPISODE I DAN EPISODE II” KARYA ONET ADITHIA RIZLAN
ANALISIS ALIH KODE DAN CAMPUR KODE PADA FILM “SANG PRAWIRA EPISODE I DAN EPISODE II” KARYA ONET ADITHIA RIZLAN
This study of code switching and code mixing analysis in the film "Sang Prawira Episode I and Episode II" by Onet Adithia Rizlan aims to determine code switching and code mixing se...
Mobile Code and Security Issues
Mobile Code and Security Issues
Over the years, computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms...
Mobile Code and Security Issues
Mobile Code and Security Issues
Over the years, computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms...
Mobile Code and Security Issues
Mobile Code and Security Issues
Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms ...

Back to Top