International Workshop on Post-Quantum Cryptography

PQCrypto 2008: Post-Quantum Cryptography pp 47-62

McEliece Cryptosystem Implementation: Theory and Practice

  • Bhaskar Biswas
  • Nicolas Sendrier
Conference paper

DOI: 10.1007/978-3-540-88403-3_4

Volume 5299 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Biswas B., Sendrier N. (2008) McEliece Cryptosystem Implementation: Theory and Practice. In: Buchmann J., Ding J. (eds) Post-Quantum Cryptography. PQCrypto 2008. Lecture Notes in Computer Science, vol 5299. Springer, Berlin, Heidelberg

Abstract

Though it is old and considered fast, the implementation of McEliece public-key encryption scheme has never been thoroughly studied. We consider that problem here and we provide an implementation with a complete description of our algorithmic choices and parameters selection, together with the state of the art in cryptanalysis. This provides a reference for measuring speed and scalability of this cryptosystem. Compared with other, number-theory based, public key scheme, we demonstrate a gain of a factor at least 5 to 10.

Keywords

public-key cryptosystem McEliece encryption scheme code-based cryptography cryptographic implementation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Bhaskar Biswas
    • 1
  • Nicolas Sendrier
    • 1
  1. 1.Centre de recherche INRIA Paris - RocquencourtDomaine de Voluceau, Rocquencourt - B.P. 105Le Chesnay CedexFrance