메뉴 건너뛰기




Volumn 8441 LNCS, Issue , 2014, Pages 17-39

Polynomial time attack on wild McEliece over quadratic extensions

Author keywords

cryptanalysis; filtration; public key cryptography; wild McEliece cryptosystem

Indexed keywords

FILTRATION; POLYNOMIAL APPROXIMATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 84901650553     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-55220-5_2     Document Type: Conference Paper
Times cited : (35)

References (48)
  • 2
    • 52149114896 scopus 로고    scopus 로고
    • A new analysis of the McEliece cryptosystem based on QC-LDPC codes
    • Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
    • Baldi, M., Bodrato, M., Chiaraluce, F.: A new analysis of the McEliece cryptosystem based on QC-LDPC codes. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 246-262. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5229 , pp. 246-262
    • Baldi, M.1    Bodrato, M.2    Chiaraluce, F.3
  • 3
    • 84860003018 scopus 로고    scopus 로고
    • n/20: How 1 + 1 = 0 improves information set decoding
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
    • n/20: How 1 + 1 = 0 improves information set decoding. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 520-536. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 520-536
    • Becker, A.1    Joux, A.2    May, A.3    Meurer, A.4
  • 4
    • 14844342361 scopus 로고    scopus 로고
    • How to mask the structure of codes for a cryptographic use
    • Berger, T.P., Loidreau, P.: How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35(1), 63-79 (2005)
    • (2005) Des. Codes Cryptogr. , vol.35 , Issue.1 , pp. 63-79
    • Berger, T.P.1    Loidreau, P.2
  • 5
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and defending the McEliece cryptosystem
    • Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 6
    • 79952615449 scopus 로고    scopus 로고
    • Wild mcEliece
    • Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Wild mcEliece. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 143-158. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6544 , pp. 143-158
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 7
    • 82955186254 scopus 로고    scopus 로고
    • Wild mcEliece incognito
    • Yang, B.-Y. (ed.) PQCrypto 2011. Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Wild mcEliece incognito. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 244-254. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7071 , pp. 244-254
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 9
    • 0031232428 scopus 로고    scopus 로고
    • The Magma algebra system I: The user language
    • Bosma, W., Cannon, J.J., Playoust, C.: The Magma algebra system I: The user language. J. Symbolic Comput. 24(3/4), 235-265 (1997)
    • (1997) J. Symbolic Comput. , vol.24 , Issue.3-4 , pp. 235-265
    • Bosma, W.1    Cannon, J.J.2    Playoust, C.3
  • 10
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
    • Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Trans. Inform. Theory 44(1), 367-378 (1998)
    • (1998) IEEE Trans. Inform. Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 11
    • 70350343371 scopus 로고    scopus 로고
    • Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Cascudo, I., Chen, H., Cramer, R., Xing, C.: Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 466-486. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 466-486
    • Cascudo, I.1    Chen, H.2    Cramer, R.3    Xing, C.4
  • 12
    • 80051980228 scopus 로고    scopus 로고
    • The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Cascudo, I., Cramer, R., Xing, C.: The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 685-705. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 685-705
    • Cascudo, I.1    Cramer, R.2    Xing, C.3
  • 13
    • 84905217777 scopus 로고    scopus 로고
    • Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
    • ArXiv:1307.6458 To appear in
    • Couvreur, A., Gaborit, P., Gauthier-Umaña, V., Otmani, A., Tillich, J.-P.: Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. ArXiv:1307.6458 (2014) To appear in Des. Codes Cryptogr.
    • (2014) Des. Codes Cryptogr.
    • Couvreur, A.1    Gaborit, P.2    Gauthier-Umaña, V.3    Otmani, A.4    Tillich, J.-P.5
  • 18
    • 77954636190 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of mcEliece variants with compact keys
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Faugère, J.-C., Otmani, A., Perret, L., Tillich, J.-P.: Algebraic cryptanalysis of mcEliece variants with compact keys. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 279-298. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 279-298
    • Faugère, J.-C.1    Otmani, A.2    Perret, L.3    Tillich, J.-P.4
  • 21
    • 25444433745 scopus 로고
    • Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem
    • Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
    • Gibson, J.K.: Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 517-521. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 517-521
    • Gibson, J.K.1
  • 22
    • 0346871653 scopus 로고    scopus 로고
    • McEliece public key cryptosystems using algebraic-geometric codes
    • Janwa, H., Moreno, O.: McEliece public key cryptosystems using algebraic-geometric codes. Des. Codes Cryptogr. 8(3), 293-307 (1996)
    • (1996) Des. Codes Cryptogr. , vol.8 , Issue.3 , pp. 293-307
    • Janwa, H.1    Moreno, O.2
  • 24
    • 84884480571 scopus 로고    scopus 로고
    • An efficient attack of a mcEliece cryptosystem variant based on convolutional codes
    • Gaborit, P. (ed.) PQCrypto 2013. Springer, Heidelberg
    • Landais, G., Tillich, J.-P.: An efficient attack of a mcEliece cryptosystem variant based on convolutional codes. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 102-117. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7932 , pp. 102-117
    • Landais, G.1    Tillich, J.-P.2
  • 25
    • 85034651324 scopus 로고
    • An observation on the security of McEliece's publickey cryptosystem
    • Günther, C.G. (ed.) EUROCRYPT 1988. Springer, Heidelberg
    • Lee, P.J., Brickell, E.F.: An observation on the security of McEliece's publickey cryptosystem. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.330 , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 26
    • 0024078914 scopus 로고
    • A probabilistic algorithm for computing minimum weights of large error-correcting codes
    • Leon, J.S.: A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Trans. Inform. Theory 34(5), 1354-1359 (1988)
    • (1988) IEEE Trans. Inform. Theory , vol.34 , Issue.5 , pp. 1354-1359
    • Leon, J.S.1
  • 27
    • 0035270825 scopus 로고    scopus 로고
    • Weak keys in the McEliece public-key cryptosystem
    • Loidreau, P., Sendrier, N.: Weak keys in the McEliece public-key cryptosystem. IEEE Trans. Inform. Theory 47(3), 1207-1211 (2001)
    • (2001) IEEE Trans. Inform. Theory , vol.47 , Issue.3 , pp. 1207-1211
    • Loidreau, P.1    Sendrier, N.2
  • 28
    • 84868307945 scopus 로고    scopus 로고
    • A new version of mcEliece PKC based on convolutional codes
    • Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. Springer, Heidelberg
    • Löndahl, C., Johansson, T.: A new version of mcEliece PKC based on convolutional codes. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 461-470. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7618 , pp. 461-470
    • Löndahl, C.1    Johansson, T.2
  • 34
    • 82955177030 scopus 로고    scopus 로고
    • 0.054n)
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • 0.054n). In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 107-124. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 107-124
    • May, A.1    Meurer, A.2    Thomae, E.3
  • 35
    • 0002448405 scopus 로고
    • A Public-Key System Based on Algebraic Coding Theory
    • Jet Propulsion Lab.
    • McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory. Jet Propulsion Lab., 114-116 (1978), DSN Progress Report 44
    • (1978) DSN Progress Report , vol.44 , pp. 114-116
    • McEliece, R.J.1
  • 36
    • 38049165687 scopus 로고    scopus 로고
    • Cryptanalysis of the Sidelnikov Cryptosystem
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Minder, L., Shokrollahi, M.A.: Cryptanalysis of the Sidelnikov Cryptosystem. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 347-360. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 347-360
    • Minder, L.1    Shokrollahi, M.A.2
  • 38
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15(2), 159-166 (1986)
    • (1986) Problems of Control and Information Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 40
    • 38249008268 scopus 로고
    • On decoding by error location and dependent sets of error positions
    • Pellikaan, R.: On decoding by error location and dependent sets of error positions. Discrete Math. 107, 368-381 (1992)
    • (1992) Discrete Math. , vol.107 , pp. 368-381
    • Pellikaan, R.1
  • 41
    • 77954391096 scopus 로고    scopus 로고
    • q
    • Sendrier, N. (ed.) PQCrypto 2010. Springer, Heidelberg
    • q. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 81-94. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6061 , pp. 81-94
    • Peters, C.1
  • 42
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent linear codes: The support splitting algorithm
    • Sendrier, N.: Finding the permutation between equivalent linear codes: The support splitting algorithm. IEEE Trans. Inform. Theory 46(4), 1193-1203 (2000)
    • (2000) IEEE Trans. Inform. Theory , vol.46 , Issue.4 , pp. 1193-1203
    • Sendrier, N.1
  • 43
    • 0027983324 scopus 로고
    • A public-key cryptosytem based on Reed-Muller codes
    • Sidelnikov, V.M.: A public-key cryptosytem based on Reed-Muller codes. Discrete Math. Appl. 4(3), 191-207 (1994)
    • (1994) Discrete Math. Appl. , vol.4 , Issue.3 , pp. 191-207
    • Sidelnikov, V.M.1
  • 44
    • 84929257781 scopus 로고
    • On the insecurity of cryptosystems based on generalized Reed-Solomon codes
    • Sidelnikov, V.M., Shestakov, S.O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Math. Appl. 1(4), 439-444 (1992)
    • (1992) Discrete Math. Appl. , vol.1 , Issue.4 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 45
    • 84964937021 scopus 로고
    • A method for finding codewords of small weight
    • Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. Springer, Heidelberg
    • Stern, J.: A method for finding codewords of small weight. In: Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
    • (1989) LNCS , vol.388 , pp. 106-113
    • Stern, J.1
  • 46
    • 0016996242 scopus 로고
    • Further results on Goppa codes and their applications to constructing efficient binary codes
    • Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: Further results on Goppa codes and their applications to constructing efficient binary codes. IEEE Trans. Inform. Theory 22, 518-526 (1976)
    • (1976) IEEE Trans. Inform. Theory , vol.22 , pp. 518-526
    • Sugiyama, Y.1    Kasahara, M.2    Hirasawa, S.3    Namekawa, T.4
  • 47
    • 39049099966 scopus 로고    scopus 로고
    • Two NP-complete problems in coding theory with an application in code based cryptography
    • Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: 2006 IEEE International Symposium on Information Theory, pp. 1733-1737 (2006)
    • (2006) 2006 IEEE International Symposium on Information Theory , pp. 1733-1737
    • Wieschebrink, C.1
  • 48
    • 77954408355 scopus 로고    scopus 로고
    • Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
    • Sendrier, N. (ed.) PQCrypto 2010. Springer, Heidelberg
    • Wieschebrink, C.: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 61-72. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6061 , pp. 61-72
    • Wieschebrink, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.