Rakesh Kumar, Allu Swamy Naidu, Ajeet Singh, A. Tentu
{"title":"McEliece cryptosystem: simulation and security vulnerabilities","authors":"Rakesh Kumar, Allu Swamy Naidu, Ajeet Singh, A. Tentu","doi":"10.1504/ijcsm.2020.10030822","DOIUrl":null,"url":null,"abstract":"While symmetric key cryptosystems utilise single private key at both ends for encryption and decryption purposes and this mentioned scenario gives advantages of better speed-up as compare to public key cryptosystems. Still, security is a challenge while performing compatibly efficient key distribution and secure private data transfer among entities in an untrusted environment. McEliece cryptosystem, designed in 1978, is a public key based cryptosystem whose security is based on some unknown natured error-correcting codes. This paper gives state-of-the-art detailed overview on this cryptosystem, its component-wise algorithmic description and implementation. Various attacks on McEliece cryptosystem are discussed separately. The experimental results employing Goppa codes are also presented in the paper where the simulations are performed on various extension degrees. Based on the simulations performed, we concluded the results along with the various issues faced while implementation.","PeriodicalId":45487,"journal":{"name":"International Journal of Computing Science and Mathematics","volume":"1 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2020-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing Science and Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijcsm.2020.10030822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
While symmetric key cryptosystems utilise single private key at both ends for encryption and decryption purposes and this mentioned scenario gives advantages of better speed-up as compare to public key cryptosystems. Still, security is a challenge while performing compatibly efficient key distribution and secure private data transfer among entities in an untrusted environment. McEliece cryptosystem, designed in 1978, is a public key based cryptosystem whose security is based on some unknown natured error-correcting codes. This paper gives state-of-the-art detailed overview on this cryptosystem, its component-wise algorithmic description and implementation. Various attacks on McEliece cryptosystem are discussed separately. The experimental results employing Goppa codes are also presented in the paper where the simulations are performed on various extension degrees. Based on the simulations performed, we concluded the results along with the various issues faced while implementation.