{"title":"关于一个对McEliece密码系统的结构性攻击","authors":"E. Krouk, A. Ovchinnikov","doi":"10.1109/RED.2016.7779333","DOIUrl":null,"url":null,"abstract":"In this paper an attack on McEliece cryptosystem is considered. In this system the private and public keys are generator matrices of equivalent codes, i.e. they differ by fixed (secret) permutation. At the same time it is known that for every code there are the group of permutations preserving the code. Such code's structure may be used for analysis of McEliece cryptosystem.","PeriodicalId":237844,"journal":{"name":"2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"About one structural attack on McEliece cryptosystem\",\"authors\":\"E. Krouk, A. Ovchinnikov\",\"doi\":\"10.1109/RED.2016.7779333\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper an attack on McEliece cryptosystem is considered. In this system the private and public keys are generator matrices of equivalent codes, i.e. they differ by fixed (secret) permutation. At the same time it is known that for every code there are the group of permutations preserving the code. Such code's structure may be used for analysis of McEliece cryptosystem.\",\"PeriodicalId\":237844,\"journal\":{\"name\":\"2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY)\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RED.2016.7779333\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RED.2016.7779333","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
About one structural attack on McEliece cryptosystem
In this paper an attack on McEliece cryptosystem is considered. In this system the private and public keys are generator matrices of equivalent codes, i.e. they differ by fixed (secret) permutation. At the same time it is known that for every code there are the group of permutations preserving the code. Such code's structure may be used for analysis of McEliece cryptosystem.