{"title":"McEliece and Niederreiter Cryptosystems Analysis in the Context of Post-Quantum Network Security","authors":"A. Vambol, V. Kharchenko, O. Potii, N. Bardis","doi":"10.1109/MCSI.2017.31","DOIUrl":null,"url":null,"abstract":"In this paper a consideration of the McEliece and Niederreiter cryptosystems as tools for providing the postquantum information security in networks, is proposed. Theoretical foundation and the characteristics of these crypto ciphers and other asymmetric once are analyzed. The considered metrics of cryptographic schemes include cryptographic strength, performance, public key size and length of ciphertext. The binary Goppa codes and their role in ensuring the cryptanalytic resistance of these systems are described. The main advantages and drawbacks of these cryptosystems are analyzed. Outlines the possible application of these ciphers to the network security protocols are discussed including the search for ways to reduce the public key sizes of these cryptographic schemes and improve their energy efficiency.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MCSI.2017.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this paper a consideration of the McEliece and Niederreiter cryptosystems as tools for providing the postquantum information security in networks, is proposed. Theoretical foundation and the characteristics of these crypto ciphers and other asymmetric once are analyzed. The considered metrics of cryptographic schemes include cryptographic strength, performance, public key size and length of ciphertext. The binary Goppa codes and their role in ensuring the cryptanalytic resistance of these systems are described. The main advantages and drawbacks of these cryptosystems are analyzed. Outlines the possible application of these ciphers to the network security protocols are discussed including the search for ways to reduce the public key sizes of these cryptographic schemes and improve their energy efficiency.