Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

Workshop on the Theory and Application of of Cryptographic Techniques

EUROCRYPT 1988: Advances in Cryptology — EUROCRYPT ’88 pp 275–280Cite as

  1. Home
  2. Advances in Cryptology — EUROCRYPT ’88
  3. Conference paper
An Observation on the Security of McEliece’s Public-Key Cryptosystem

An Observation on the Security of McEliece’s Public-Key Cryptosystem

  • P. J. Lee2 &
  • E. F. Brickell2 nAff3 
  • Conference paper
  • First Online: 01 January 2000
  • 2827 Accesses

  • 118 Citations

  • 3 Altmetric

Part of the Lecture Notes in Computer Science book series (LNCS,volume 330)

Abstract

The best known cryptanalytic attack on McEliece’s public-key cryptosystem based on algebraic coding theory is to repeatedly select k bits at random from an n-bit ciphertext vector, which is corrupted by at most t errors, in hope that none of the selected k bits are in error until the cryptanalyst recovers the correct message. The method of determining whether the recovered message is the correct one has not been throughly investigated. In this paper, we suggest a systematic method of checking, and describe a generalized version of the cryptanalytic attack which reduces the work factor significantly (factor of 211 for the commonly used example of n=1024 Goppa code case). Some more improvements are also given. We also note that these cryptanalytic algorithms can be viewed as generalized probabilistic decoding algorithms for any linear error correcting codes.

Keywords

  • Work Factor
  • Error Correction Capability
  • Goppa Code
  • Correct Message
  • Cryptanalytic Attack

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. R. J. McEliece, “A public-key cryptosystem based on algebraic coding theory,” CA, May 1978.

    Google Scholar 

  2. E. R. Berlekamp, “Goppa codes,” IEEE Trans. Info. Theory, Vol. IT-19, pp. 590–592, Sept. 1913.

    MathSciNet  Google Scholar 

  3. T.R.N. Rao and K.-H. Nam, “Private-key algebraic-coded cryptosystems,” Proc. Crypto’ 86, pp. 35–48, Aug. 1986

    Google Scholar 

  4. C. M. Adams and H. Meijer, “Security-related comments regarding McEliece’s public-key cryptosystem,” to appear in Roc. Crypto’ 87, Aug. 1987

    Google Scholar 

  5. D. E. Knuth, The Art of Computer Programming, Vol. 2. Seminumerical Algorithms, Addison-Wesley, 1981

    Google Scholar 

  6. E. R. Berlekamp, et al., “On the inherent intactability of certain coding problems,” IEEE Trans. Info. Theory, Vol. IT-22, pp. 644–654, May 1978.

    MathSciNet  Google Scholar 

Download references

Author information

Author notes
  1. E. F. Brickell

    Present address: Sandia National Laboratories, Albuquerque, NM, 87183, USA

Authors and Affiliations

  1. Bell Communications Research, Morristown, NJ, 07960, USA

    P. J. Lee & E. F. Brickell

Authors
  1. P. J. Lee
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. E. F. Brickell
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Asea Brown Boveri, Corporate Research, CH-5405, Baden, Switzerland

    Christoph G. Günther

Rights and permissions

Reprints and Permissions

Copyright information

© 1988 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, P.J., Brickell, E.F. (1988). An Observation on the Security of McEliece’s Public-Key Cryptosystem. In: Barstow, D., et al. Advances in Cryptology — EUROCRYPT ’88. EUROCRYPT 1988. Lecture Notes in Computer Science, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45961-8_25

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/3-540-45961-8_25

  • Published: 01 December 2000

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-50251-7

  • Online ISBN: 978-3-540-45961-3

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

34.229.63.28

Not affiliated

Springer Nature

© 2023 Springer Nature