Modern variations of McEliece and Niederreiter cryptosystems
Annotation
Classical cryptosystems proposed by Robert McEliece (1978) and Harold Niederreiter (1986) and their modern variations are studied. A detailed review of five code-based public key cryptosystems has been presented. It is shown that some of the modern interpretations of the classical McEliece and Niederreiter cryptosystems have significant issues. In particular, it has been established that the XGRS cryptosystem based on extended Reed-Solomon codes does not provide the declared level of security against the information set decoding attack, and also has a number of inaccuracies. It is shown that the time of key generation and decryption in modern cryptosystems is quite large, and the public and private keys take up a large amount of memory. The inaccuracies of the considered schemes revealed in this work can be used to improve and adjust the systems, as well as to build a more accurate assessment of their security level and efficiency. The presented cryptosystems can be considered as standards for post-quantum cryptography and can be used to protect data after development of powerful quantum computers.
Keywords
Постоянный URL
Articles in current issue
- Dynamic range restrictions influence of the fiber-optic towed seismic streamer on the seismogram quality
- Control of MIMO linear plants with a guarantee for the controlled signals to stay in a given set
- Elliposoidal estimates of trajectory sensitivity of multi-dimensional processes based on generalized singular values problems
- Nonlinear rheological models and their application to describe the mechanical behavior of highly oriented polymer materials
- Research on the effectiveness of noise reduction when encoding a lossless speech signal
- Lightweight approach for malicious domain detection using machine learning
- Cloud computing simulation model with a sporadic mechanism of parallel task solving control
- Methods of local features extraction in person authentication task by face thermographic image
- Classification of short texts using a wave model
- Algorithm for energy-efficient interaction of wireless sensor network nodes
- Auxiliary arbitrary waveform generator for fiber optic gyroscope
- Constructing twitter corpus of Iraqi Arabic Dialect (CIAD) for sentiment analysis
- A novel framework for the prevention of black-hole in wireless sensors using hybrid convolution network
- Modern variations of McEliece and Niederreiter cryptosystems
- Lightweight ECC and token based authentication mechanism for WSN-IoT
- Model of the acoustic path of a separatecombined optical-acoustic transducer
- Study on received signal strength of femtocell with circular and rectangular microstrip patch antenna designed at 2.55 GHz
- Whirlpool Hash Mutual Biometric Serpent Authentication (WPHMBSA) for secured data access in cloud environment
- IRDFPR-CMDNN: An energy efficient and reliable routing protocol for improved data transmission in MANET
- Influence investigation of electromagnetic-acoustic transducer parameters on thickness measurement accuracy by numerical modeling methods
- Detection of quadcopter propeller failure by machine learning methods
- Throughput modeling of cellular network systems with spatial precoding
- Visual display system of changes in physiological state for patients with chronic disorders
- Method for discovering spatial arm positions with depth sensor data at low-performance devices