Advertisement

On the McEliece Public-Key Cryptosystem

  • Johan van Tilburg
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 403)

Abstract

Based on an idea by Hin, the method of obtaining the original message after selecting k of n coordinates at random in the McEliece public-key cryptosystem is improved. The attack, which is more efficient than the attacks previously proposed, is characterized by a systematic method of checking and by a random bit swapping procedure. An optimization procedure similar to the one proposed by Lee and Brickell is used to improve the attack. The attack is highly suitable for parallel and pipelined implementation. The work factor and the values, which yield ‘maximum’ security for the system are given.

It is shown that the public-key can be reduced to k × (nk) bits.

Keywords

Linear Code Work Factor Permutation Matrix Error Pattern Original Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    C. Adams and H. Meijer, “Security-Related Comments Regarding McEliece’s Public-Key Cryptosystem”, in: Advances in Cryptology-CRYPTO’ 87, Carl Pomerance ed., Lecture Notes in Computer Science # 293, Springer-Verlag, pp. 224–228, 1988.Google Scholar
  2. [2]
    E.R. Berlekamp, R.J. McEliece and H.C.A. van Tilborg, “On the inherent intractability of certain coding problems”, IEEE Trans. Inform. Theory, vol. IT-24, pp. 384–386, 1978.CrossRefGoogle Scholar
  3. [3]
    W. Diffie and M.E. Hellman, “New Directions in Cryptography”, IEEE Trans. Inform. Theory, vol. IT-22, pp. 644–654, 1976.CrossRefMathSciNetGoogle Scholar
  4. [4]
    P.J.M. Hin, “Channel-Error-Correcting Privacy Cryptosystems”, M.Sc. Thesis, Delft University of Technology, 1986 (in Dutch).Google Scholar
  5. [5]
    P.J.M. Hin, Private Communication, December 1986.Google Scholar
  6. [6]
    D.E. Knuth, The art of computer Programming, Vol.2 / Seminumerical Algorithms, Addison-Wesley Publishing Company, 1981.Google Scholar
  7. [7]
    P.J. Lee and E.F. Brickell, “An observation on the Security of McEliece’s Public-Key Cryptosystem”, Presented at Eurocrypt’88, Davos, May 1988.Google Scholar
  8. [8]
    F.J. MacWilliams and N.J.A. Sloane, The Theory of Error-Correcting Codes, Amsterdam: North-Holland, 1978.Google Scholar
  9. [9]
    R.J. McEliece, “A Public-Key Cryptosystem Based on Algebraic Coding Theory”, DSN Progress Report 42-44, JPL Pasadena, pp. 114–116, 1978.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1990

Authors and Affiliations

  • Johan van Tilburg
    • 1
  1. 1.Department of Applied MathematicsDr. Neher LaboratoriesLeidschendamthe Netherlands

Personalised recommendations