Javascript must be enabled to continue!
Cryptanalysis of McEliece cryptosystem variants based on quasi‐cyclic low‐density parity check codes
View through CrossRef
One of the approaches to modify the McEliece cryptosystem to overcome its large key size is replacing binary Goppa codes with a new structured code. However, this modification makes such cryptosystems encounter some new attacks. There are a few modified McEliece cryptosystem variants which are known to be secure. One of them is the cryptosystem introduced by Baldi
et al
. which uses quasi‐cyclic low‐density parity check (QC‐LDPC) codes. This cryptosystem is still unbroken as no efficient attack has been reported against it since 2008. In this study, an attack has been applied to this cryptosystem which is feasible when the code length is a multiple of a power of 2. Also an important weakness of this kind of cryptosystem has been pointed out, namely utilising a too low‐weight intentional error vector. The authors have established a new security level for this cryptosystem which is applicable to other McEliece‐like cryptosystems using QC‐LDPC codes. This security level for instance is 2
9.18
times lower than previous ones in the case of
n
= 4 × 4096 when only one ciphertext is available. The gain of the attack in this study can be increased if more than one ciphertext is available.
Institution of Engineering and Technology (IET)
Title: Cryptanalysis of McEliece cryptosystem variants based on quasi‐cyclic low‐density parity check codes
Description:
One of the approaches to modify the McEliece cryptosystem to overcome its large key size is replacing binary Goppa codes with a new structured code.
However, this modification makes such cryptosystems encounter some new attacks.
There are a few modified McEliece cryptosystem variants which are known to be secure.
One of them is the cryptosystem introduced by Baldi
et al
.
which uses quasi‐cyclic low‐density parity check (QC‐LDPC) codes.
This cryptosystem is still unbroken as no efficient attack has been reported against it since 2008.
In this study, an attack has been applied to this cryptosystem which is feasible when the code length is a multiple of a power of 2.
Also an important weakness of this kind of cryptosystem has been pointed out, namely utilising a too low‐weight intentional error vector.
The authors have established a new security level for this cryptosystem which is applicable to other McEliece‐like cryptosystems using QC‐LDPC codes.
This security level for instance is 2
9.
18
times lower than previous ones in the case of
n
= 4 × 4096 when only one ciphertext is available.
The gain of the attack in this study can be increased if more than one ciphertext is available.
Related Results
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
In this chapter, the authors have defined a new ElGamal cryptosystem by using the power Fibonacci sequence module m. Then they have defined a new sequence module m and the other El...
Decoding of block and convolutional codes in rank metric
Decoding of block and convolutional codes in rank metric
Décodage des codes en bloc et des codes convolutifs en métrique rang
Les code en métrique rang attirent l’attention depuis quelques années en raison de leur applica...
Generalised array low‐density parity‐check codes
Generalised array low‐density parity‐check codes
In this study, using Group Permutation Low‐Density Parity‐Check (GP‐LDPC) codes, the authors generalise the concept of array Low‐Density Parity‐Check (LDPC) codes from fields of pr...
Linking White‐Tailed Deer Density, Nutrition, and Vegetation in a Stochastic Environment
Linking White‐Tailed Deer Density, Nutrition, and Vegetation in a Stochastic Environment
ABSTRACT
Density‐dependent behavior underpins white‐tailed deer (
Odocoileus virginianus
) theory and...
Cryptography With Mceliece Algorithm (Code Based Cryptography)
Cryptography With Mceliece Algorithm (Code Based Cryptography)
Cryptography is the science used to protect information from unauthorized access. One promising cryptographic algorithm is the McEliece algorithm, which uses code-based cryptograph...
Quasi~λ-cyclic Codes Over a Class of Finite Commutative Semi-simple Rings
Quasi~λ-cyclic Codes Over a Class of Finite Commutative Semi-simple Rings
Abstract
In coding theory, quasi λ-cyclic codes form an important class of codes which have been extensively studied. In this paper, we investigate the algebraic structure ...
The Role of Eigenvalues of Parity Check Matrix in Low-Density Parity Check Codes
The Role of Eigenvalues of Parity Check Matrix in Low-Density Parity Check Codes
The new developments in coding theory research have revolutionized the application of coding to practical systems. Low-Density Parity Check (LDPC) codes form a class of Shannon lim...
Comparative studies and analysis of efficiency code-based hybrid cryptosystem
Comparative studies and analysis of efficiency code-based hybrid cryptosystem
The basic principles of construction and operation of McEliece and Niederreiter cryptosystems based on the use of error-correcting codes are considered. A new hybrid cryptosystem, ...

