Rakesh Kumar, Allu Swamy Naidu, Ajeet Singh, A. Tentu
{"title":"McEliece密码系统:模拟与安全漏洞","authors":"Rakesh Kumar, Allu Swamy Naidu, Ajeet Singh, A. Tentu","doi":"10.1504/ijcsm.2020.10030822","DOIUrl":null,"url":null,"abstract":"While symmetric key cryptosystems utilise single private key at both ends for encryption and decryption purposes and this mentioned scenario gives advantages of better speed-up as compare to public key cryptosystems. Still, security is a challenge while performing compatibly efficient key distribution and secure private data transfer among entities in an untrusted environment. McEliece cryptosystem, designed in 1978, is a public key based cryptosystem whose security is based on some unknown natured error-correcting codes. This paper gives state-of-the-art detailed overview on this cryptosystem, its component-wise algorithmic description and implementation. Various attacks on McEliece cryptosystem are discussed separately. The experimental results employing Goppa codes are also presented in the paper where the simulations are performed on various extension degrees. Based on the simulations performed, we concluded the results along with the various issues faced while implementation.","PeriodicalId":45487,"journal":{"name":"International Journal of Computing Science and Mathematics","volume":"1 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2020-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"McEliece cryptosystem: simulation and security vulnerabilities\",\"authors\":\"Rakesh Kumar, Allu Swamy Naidu, Ajeet Singh, A. Tentu\",\"doi\":\"10.1504/ijcsm.2020.10030822\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While symmetric key cryptosystems utilise single private key at both ends for encryption and decryption purposes and this mentioned scenario gives advantages of better speed-up as compare to public key cryptosystems. Still, security is a challenge while performing compatibly efficient key distribution and secure private data transfer among entities in an untrusted environment. McEliece cryptosystem, designed in 1978, is a public key based cryptosystem whose security is based on some unknown natured error-correcting codes. This paper gives state-of-the-art detailed overview on this cryptosystem, its component-wise algorithmic description and implementation. Various attacks on McEliece cryptosystem are discussed separately. The experimental results employing Goppa codes are also presented in the paper where the simulations are performed on various extension degrees. Based on the simulations performed, we concluded the results along with the various issues faced while implementation.\",\"PeriodicalId\":45487,\"journal\":{\"name\":\"International Journal of Computing Science and Mathematics\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2020-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computing Science and Mathematics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijcsm.2020.10030822\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing Science and Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijcsm.2020.10030822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
McEliece cryptosystem: simulation and security vulnerabilities
While symmetric key cryptosystems utilise single private key at both ends for encryption and decryption purposes and this mentioned scenario gives advantages of better speed-up as compare to public key cryptosystems. Still, security is a challenge while performing compatibly efficient key distribution and secure private data transfer among entities in an untrusted environment. McEliece cryptosystem, designed in 1978, is a public key based cryptosystem whose security is based on some unknown natured error-correcting codes. This paper gives state-of-the-art detailed overview on this cryptosystem, its component-wise algorithmic description and implementation. Various attacks on McEliece cryptosystem are discussed separately. The experimental results employing Goppa codes are also presented in the paper where the simulations are performed on various extension degrees. Based on the simulations performed, we concluded the results along with the various issues faced while implementation.