McEliece cryptosystem: simulation and security vulnerabilities

IF 0.5 Q4 ENGINEERING, MULTIDISCIPLINARY International Journal of Computing Science and Mathematics Pub Date : 2020-07-27 DOI:10.1504/ijcsm.2020.10030822
Rakesh Kumar, Allu Swamy Naidu, Ajeet Singh, A. Tentu
{"title":"McEliece cryptosystem: simulation and security vulnerabilities","authors":"Rakesh Kumar, Allu Swamy Naidu, Ajeet Singh, A. Tentu","doi":"10.1504/ijcsm.2020.10030822","DOIUrl":null,"url":null,"abstract":"While symmetric key cryptosystems utilise single private key at both ends for encryption and decryption purposes and this mentioned scenario gives advantages of better speed-up as compare to public key cryptosystems. Still, security is a challenge while performing compatibly efficient key distribution and secure private data transfer among entities in an untrusted environment. McEliece cryptosystem, designed in 1978, is a public key based cryptosystem whose security is based on some unknown natured error-correcting codes. This paper gives state-of-the-art detailed overview on this cryptosystem, its component-wise algorithmic description and implementation. Various attacks on McEliece cryptosystem are discussed separately. The experimental results employing Goppa codes are also presented in the paper where the simulations are performed on various extension degrees. Based on the simulations performed, we concluded the results along with the various issues faced while implementation.","PeriodicalId":45487,"journal":{"name":"International Journal of Computing Science and Mathematics","volume":"1 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2020-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing Science and Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijcsm.2020.10030822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

While symmetric key cryptosystems utilise single private key at both ends for encryption and decryption purposes and this mentioned scenario gives advantages of better speed-up as compare to public key cryptosystems. Still, security is a challenge while performing compatibly efficient key distribution and secure private data transfer among entities in an untrusted environment. McEliece cryptosystem, designed in 1978, is a public key based cryptosystem whose security is based on some unknown natured error-correcting codes. This paper gives state-of-the-art detailed overview on this cryptosystem, its component-wise algorithmic description and implementation. Various attacks on McEliece cryptosystem are discussed separately. The experimental results employing Goppa codes are also presented in the paper where the simulations are performed on various extension degrees. Based on the simulations performed, we concluded the results along with the various issues faced while implementation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
McEliece密码系统:模拟与安全漏洞
而对称密钥密码系统在两端使用单个私钥进行加密和解密,并且与公钥密码系统相比,上述场景具有更好的加速优势。尽管如此,在不受信任的环境中,在实体之间执行兼容高效的密钥分发和安全的私有数据传输时,安全性仍然是一个挑战。McEliece密码系统设计于1978年,是一种基于公钥的密码系统,其安全性基于一些未知性质的纠错码。本文对该密码系统及其组件算法描述和实现进行了最新的详细概述。分别讨论了对McEliece密码系统的各种攻击。文中还给出了采用Goppa码的实验结果,其中对不同的扩展度进行了仿真。基于所进行的模拟,我们总结了结果以及在实施过程中面临的各种问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
1.30
自引率
0.00%
发文量
37
期刊最新文献
Application of hybrid genetic algorithm based on travelling salesman problem in rural tourism route planning Non-destructive Diagnosis of Knee Osteoarthritis Based on Sparse Coding of MRI Hierarchical neural network detection model based on deep context and attention mechanism Particle resolved direct numerical simulation of heat transfer in gas-solid flows Research on bilingual text similarity detection and analysis based on improved fragment merging algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1