Advertisement

On private-key cryptosystems based on product codes

  • Hung -Min Sun
  • Shiuh -Pyng Shieh
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1438)

Abstract

Recently J. and R.M. Campello de Souza proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we show that J. and R.M. Campello de Souza's scheme is insecure against chosen-plaintext attacks, and consequently propose a secure modified scheme.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    McEliece, R.J., “A Public-Key Cryptosystem Based on Algebraic Coding Theory,” DSN Progress Report, 42–44 (1978) 114–116Google Scholar
  2. 2.
    Rivest, R.L., Shamir, A., and Adleman, L.M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM21 (2) (1978) 120–126MATHMathSciNetCrossRefGoogle Scholar
  3. 3.
    ElGamal, T., “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. IT-31 (4) (1985) 469–472MathSciNetGoogle Scholar
  4. 4.
    Korzhik, V.I., and Türkin, A.I., “Cryptanalysis of McEliece's Public-Key Cryptosystem”, Advances in Cryptology-EUROCRYPT'91, Lecture Notes in Computer Science, Springer-Verlag (1991) 68–70Google Scholar
  5. 5.
    Berson, T.A., “Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack,” Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science, Vol. 1294. Springer-Verlag (1997) 213–220Google Scholar
  6. 6.
    Rao, T.R.N., and Nam, K.H., “Private-Key Algebraic-Coded Cryptosystems,” Advances in Cryptology-CRYPTO'86, Lecture Notes in Computer Science, Springer-Verlag (1987) 35–48Google Scholar
  7. 7.
    Rao, T.R.N., and Nam, K.H., “Private-Key Algebraic-Code Encryption,” IEEE Trans., IT-35 (4) (1987) 829–833MathSciNetGoogle Scholar
  8. 8.
    Hin, P.J.M., “Channel-Error-Correcting Privacy Cryptosystems,” Ph.D. Dissertation (in Dutch), Delft University of Technology (1986)Google Scholar
  9. 9.
    Struik, R., and Tilburg, J., “The Rao-Nam Scheme Is Insecure Against a Chosen-Plaintext Attack,” Advances in Cryptology-CRYPTO'87, Lecture Notes in Computer Science, Springer-Verlag (1988) 445–457Google Scholar
  10. 10.
    Brickell, E.F., and Odlyzko, A., “Cryptanalysis: A Survey of Recent Results,” Proc. IEEE 76 (5) (1988) 153–165CrossRefGoogle Scholar
  11. 11.
    Denny, W.F., “Encryptions Using Linear and Non-Linear Codes: Implementation and Security Considerations,” Ph.D. Dissertation, The Center for Advanced Computer Studies,University of Southwestern Louisiana, Lafayette (1988)Google Scholar
  12. 12.
    Struik, R., “On the Rao-Nam Scheme Using Nonlinear Codes,” in Proc. of the 1991 IEEE Int. Symp. Information Theory (1991) 174Google Scholar
  13. 13.
    Alencar, F.M.R., Léo, A.M.P., and Campello de Souza, R.M., “Private-Key Burst Correcting Code Encryption,” in Proc. of the 1993 IEEE Int. Symp. Information Theory (1993) 227Google Scholar
  14. 14.
    Campello de Souza, R.M., and Campello de Souza, J., “Array Codes for Private-Key Encryption,” Electronics Letters 30 (17) (1994) 1394–1396CrossRefGoogle Scholar
  15. 15.
    Sun, H.M., and Shieh, S.P., “Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes,” Proc. Third ACM Conference on Computer and Communications Security (1996) 153–156Google Scholar
  16. 16.
    A1 Jabri, A., “Security of Private-Key Encryption Based on Array Codes”, Electronics Letters 32 (24) (1996) 2226–2227CrossRefGoogle Scholar
  17. 17.
    Campello de Souza, J., and Campello de Souza, R.M., “Product Codes and Private-Key Encryption,” in Proc. of the 1995 IEEE Int. Symp. Information Theory (1995) 489Google Scholar
  18. 18.
    Ross, S., A First Course in Probability, Prentice-Hall (1994)Google Scholar
  19. 19.
    Hwang, T., and Rao, T.R.N., “On the Generation of Large (s, s−1) Pairs and Permutation Matrices over the Binary Field,” Tech. Rep. Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette (1986)Google Scholar
  20. 20.
    Sun, H.M., and Hwang, T., “Key Generation of Algebraic-Code Cryptosystems”, Computers and Mathematics with Applications 27 (2) (1994) 99–106MATHMathSciNetCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Hung -Min Sun
    • 1
  • Shiuh -Pyng Shieh
    • 2
  1. 1.Department of Information ManagementChaoyang University of TechnologyWufeng, Taichung CountyTaiwan
  2. 2.Department of Computer Science and Information EngineeringNational Chiao Tung UniversityHsinchuTaiwan

Personalised recommendations