McEliece Cryptosystem Based On Extended Golay Code

11/15/2018
by   Amandeep Singh Bhatia, et al.
0

With increasing advancements in technology, it is expected that the emergence of a quantum computer will potentially break many of the public-key cryptosystems currently in use. It will negotiate the confidentiality and integrity of communications. In this regard, we have privacy protectors (i.e. Post-Quantum Cryptography), which resists attacks by quantum computers, deals with cryptosystems that run on conventional computers and are secure against attacks by quantum computers. The practice of code-based cryptography is a trade-off between security and efficiency. In this chapter, we have explored The most successful McEliece cryptosystem, based on extended Golay code [24, 12, 8]. We have examined the implications of using an extended Golay code in place of usual Goppa code in McEliece cryptosystem. Further, we have implemented a McEliece cryptosystem based on extended Golay code using MATLAB. The extended Golay code has lots of practical applications. The main advantage of using extended Golay code is that it has codeword of length 24, a minimum Hamming distance of 8 allows us to detect 7-bit errors while correcting for 3 or fewer errors simultaneously and can be transmitted at high data rate.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/18/2022

A Survey on Code-Based Cryptography

The improvements on quantum technology are threatening our daily cyberse...
research
12/20/2022

An Evaluation of the State-of-the-Art Software and Hardware Implementations of BIKE

NIST is conducting a process for the standardization of post-quantum cry...
research
06/08/2022

Quantum Advantage in Cryptography

Ever since its inception, cryptography has been caught in a vicious circ...
research
05/22/2023

Algorithmic Security is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security

This survey is on forward-looking, emerging security concerns in post-qu...
research
03/17/2020

On the Use of Quantum Entanglement in Secure Communications: A Survey

Quantum computing and quantum communications are exciting new frontiers ...
research
09/21/2023

Analysis of the Error-Correcting Radius of a Renormalisation Decoder for Kitaev's Toric Code

Kitaev's toric code is arguably the most studied quantum code and is exp...
research
12/27/2022

Hardware Implementation of a Polar Code-based Public Key Cryptosystem

In recent years, there have been many studies on quantum computing and t...

Please sign up or login with your details

Forgot password? Click here to reset