Code based Cryptography: Classic McEliece

07/30/2019
by   Harshdeep Singh, et al.
0

This technical report addresses code-based cryptography and is designed to depict the complete outline of a code based public key cryptosystem. This report includes basic mathematics and fundamentals of coding theory which are useful for studying code-based cryptography. Here, we briefly describe the first scheme of code based public key cryptosystems given by R. J. McEliece in 1978 and its improved version given by H. Niederreiter in 1986. We discuss the hard problems of coding theory which are used in code based cryptography and some classic attacks on it like information-set decoding (ISD). Successful implementation of the ISD attack on McEliece cryptosystem for some small parameters set is executed and the code for the same is provided in the Appendix. This report elaborates a key encapsulation mechanism (KEM), namely Classic McEliece, based on algebraic coding theory to establish a symmetric key for two users.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/02/2020

Probability theory and public-key cryptography

In this short note, we address a common misconception at the interface o...
research
07/07/2021

Semilinear transformations in coding theory and their application to cryptography

This paper presents a brand-new idea of masking the algebraic structure ...
research
02/08/2018

Some application of difference equations in Cryptography and Coding Theory

In this paper, we present some applications of a difference equation of ...
research
12/12/2018

McNie2-Gabidulin: An improvement of McNie public key encryption using Gabidulin code

McNie is a code-based public key encryption scheme submitted as a candid...
research
11/24/2017

Image Authentication using Visual Cryptography

This report gives a novel technique of image encryption and authenticati...
research
03/19/2020

A model of public key cryptography using multinacci matrices

In this paper, we have proposed a Public Key Cryptography (P KC) using b...
research
08/28/2022

Categorical composable cryptography: extended version

We formalize the simulation paradigm of cryptography in terms of categor...

Please sign up or login with your details

Forgot password? Click here to reset