Advertisement

The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack

  • René Struik
  • Johan van Tilburg
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 293)

Abstract

The Rao-Nam scheme is discussed and generalized to Fq. It is shown that the scheme is insecure against a chosen-plaintext attack for practical code lengths. Based on observations an improved scheme is given, which is not vulnerable to the chosen-plaintext attacks as described.

Keywords

Permutation Matrix Algebraic Code Theory McEliece Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    McEliece, R.J., “A Public-Key Cryptosystem Based On Algebraic Coding Theory”, DSN Progress Report 42-44, Pasadena, JPL, pp.114–116, 1978.Google Scholar
  2. [2]
    Berlekamp, E.R., McEliece, R.J, and van Tilborg, H.C.A, “On the Inherent Intractability of Certain Coding Problems”, IEEE Trans. Inform. Theory. IT-24, pp. 384–386, 1978.CrossRefGoogle Scholar
  3. [3]
    Adams, C, Meijer, H, “Security relating comments regarding the McEliece Public-Key Cryptosystem, presented at crypto’87.Google Scholar
  4. [4]
    Jorrissen, F, “A Security Evaluation of the Public-Key Cipher System Proposed by R.J. McEliece, used as Combined Scheme”, Katholieke Universiteit Leuven, Lab. ESAT, 1986.Google Scholar
  5. [5]
    Jordan, J.P., “A Variant of a Public Key Cryptosystem based on Goppa Codes”, Sigact news, Vol 15, no: 1, pp. 61–66, 1983.CrossRefGoogle Scholar
  6. [6]
    Rao, T.R.N., Nam, K.H., “Private-Key Algebraic-Coded Cryptosystem”, in: Advances in Cryptology-CRYPTO’86, A.M. Odlyzko (Ed.), Lecture Notes in Computer Science #263, Springer, pp 35–48, 1987.Google Scholar
  7. [7]
    Hin, P.J.M., “Channel-Error-Correcting Privacy Cryptosystems”, Thesis, Delft Univ. of Techn., 1986 (in Dutch).Google Scholar
  8. [8]
    Struik, R., “Algebraic Coded Cryptosystems”, Private Communication, July 1987.Google Scholar
  9. [9]
    van Tilburq, J., “Private-Key Cryptosystems based on Algebraic Coding Theory”, Pub 87 DNL/53, PTT/DNL, the Netherlands, 1987Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1988

Authors and Affiliations

  • René Struik
    • 1
  • Johan van Tilburg
    • 2
  1. 1.Eindhoven University of TechnologyEindhoventhe Netherlands
  2. 2.PTT / Dr. Neher LaboratoriesLeidschendamthe Netherlands

Personalised recommendations