Skip to main content
Erschienen in: Mathematics in Computer Science 2/2020

17.12.2019

Computer Algebra Tales on Goppa Codes and McEliece Cryptography

verfasst von: Narcís Sayols, Sebastià Xambó-Descamps

Erschienen in: Mathematics in Computer Science | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The 40-year old McEliece public-key crypto-system is revisited with the help of recently developed resources: an improved Peterson–Gorenstein–Zierler decoder for alternant error-correcting codes; PyECC, a purely Python CAS; a package of PyECC functional utilities for the computations involved in defining, coding and decoding error-correcting codes; and a Web page with free-access to companion materials. The last two tales trace the evolution of the McEliece systems and provide an account about their current security levels.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
2
All random choices that appear in this paper are drawn according to the uniform distribution.
 
3
These kind of entities provide links that work with the pdf version. To find their destinations when reading the paper version, go directly to the page https://​mat-web.​upc.​edu/​people/​sebastia.​xambo/​Papers/​PyACA.​html.
 
4
Note that this system was broken in 1982 by A. Shamir, see [53].
 
5
McEliece does not quote Goppa’s article and instead refers to pages 179–180 and 193–194 of [29].
 
Literatur
2.
Zurück zum Zitat Augot, D., Batina, L., Bernstein, D.J., Bos, J., Buchmann, J., Castryck, W., Dunkelman, O., Güneysu, T., Gueron, S., Hülsing, A., Lange, T., Mohamed, M.S.E., Rechberger, C., Schwabe, P., Sendrier, N., Vercauteren, F., Yang, B.Y.: Initial recommendations of long-term secure post-quantum systems. PQCRYPTO / ICT-645622 / Horizon 2020 (2015). https://pqcrypto.eu.org/docs/initial-recommendations.pdf Augot, D., Batina, L., Bernstein, D.J., Bos, J., Buchmann, J., Castryck, W., Dunkelman, O., Güneysu, T., Gueron, S., Hülsing, A., Lange, T., Mohamed, M.S.E., Rechberger, C., Schwabe, P., Sendrier, N., Vercauteren, F., Yang, B.Y.: Initial recommendations of long-term secure post-quantum systems. PQCRYPTO / ICT-645622 / Horizon 2020 (2015). https://​pqcrypto.​eu.​org/​docs/​initial-recommendations.​pdf
4.
Zurück zum Zitat Berlekamp, E.: Algebraic Coding Theory. McGraw-Hill, 1968. Revised edition by Aegean Park Press in 1984, revised edition by World Scientific Publishing Co. in 2015, with a new Preface Berlekamp, E.: Algebraic Coding Theory. McGraw-Hill, 1968. Revised edition by Aegean Park Press in 1984, revised edition by World Scientific Publishing Co. in 2015, with a new Preface
5.
Zurück zum Zitat Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)MathSciNetCrossRef Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)MathSciNetCrossRef
9.
Zurück zum Zitat Bernstein, D.J., Biasse, J.F., Mosca, M.: A low-resource quantum factoring algorithm. In: Lange, T., Takagi, T., (eds.) Post-Quantum Cryptography-8th International Workshop, PQCrypto 2017, Lecture Notes in Computer Science 10346. Springer, pp. 330–346 (2017). Proceedings of the PQCrypto 2017 workshop held at Utrecht, the Netherlands, June 26-28. https://cr.yp.to/papers/grovernfs-20170419.pdf Bernstein, D.J., Biasse, J.F., Mosca, M.: A low-resource quantum factoring algorithm. In: Lange, T., Takagi, T., (eds.) Post-Quantum Cryptography-8th International Workshop, PQCrypto 2017, Lecture Notes in Computer Science 10346. Springer, pp. 330–346 (2017). Proceedings of the PQCrypto 2017 workshop held at Utrecht, the Netherlands, June 26-28. https://​cr.​yp.​to/​papers/​grovernfs-20170419.​pdf
10.
Zurück zum Zitat Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer, Berlin (2009)MATH Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer, Berlin (2009)MATH
11.
Zurück zum Zitat Bernstein, D.J., Lange, T.: Post-quantum cryptography -dealing with the fallout of physics success. Nature 549, 188–194 (2017)CrossRef Bernstein, D.J., Lange, T.: Post-quantum cryptography -dealing with the fallout of physics success. Nature 549, 188–194 (2017)CrossRef
12.
Zurück zum Zitat Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J., (eds) Post-Quantum Cryptography, Number 5299 in Lecture Notes in Computer Science, Proceedings of the Second international Workshop PQCrypto 2008, October 17–19, Cincinnati, OH, USA. Springer pp. 31–45 (2008) Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J., (eds) Post-Quantum Cryptography, Number 5299 in Lecture Notes in Computer Science, Proceedings of the Second international Workshop PQCrypto 2008, October 17–19, Cincinnati, OH, USA. Springer pp. 31–45 (2008)
13.
Zurück zum Zitat Bernstein, D.J., Lange, T., Peters, C.: Wild McEliece incognito. In: Yang, B.Y., (eds) Post-quantum Cryptography–4th International Workshop, PQCrypto 2011, Lecture Notes in Computer Science 7071, Proceedings of the PQCrypto 2011 Workshop Held at Taipei, Taiwan, November 29–December 2, 2011. Springer, pp 244–254 (2011) . https://cr.yp.to/codes/wild2-20110915.pdf Bernstein, D.J., Lange, T., Peters, C.: Wild McEliece incognito. In: Yang, B.Y., (eds) Post-quantum Cryptography–4th International Workshop, PQCrypto 2011, Lecture Notes in Computer Science 7071, Proceedings of the PQCrypto 2011 Workshop Held at Taipei, Taiwan, November 29–December 2, 2011. Springer, pp 244–254 (2011) . https://​cr.​yp.​to/​codes/​wild2-20110915.​pdf
18.
Zurück zum Zitat Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp. 157–174 (2001) Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp. 157–174 (2001)
19.
20.
22.
Zurück zum Zitat Engelbert, D., Overbeck, R., Schmidt, A.: A summary of McEliece-type cryptosystems and their security. J. Math. Cryptol. 1(2), 151–199 (2007)MathSciNetCrossRef Engelbert, D., Overbeck, R., Schmidt, A.: A summary of McEliece-type cryptosystems and their security. J. Math. Cryptol. 1(2), 151–199 (2007)MathSciNetCrossRef
23.
Zurück zum Zitat Farré, R., Sayols, N., Xambó-Descamps, S.: On the PGZ decoding algorithm for alternant codes. Comput. Appl. Math. (in press) (2018). arXiv:1704.05259 Farré, R., Sayols, N., Xambó-Descamps, S.: On the PGZ decoding algorithm for alternant codes. Comput. Appl. Math. (in press) (2018). arXiv:​1704.​05259
24.
Zurück zum Zitat Gaborit, P.: Shorter keys for code based cryptography. In: Proceedings of Workshop on Codes and Cryptography, pp. 81–90 (2005) Gaborit, P.: Shorter keys for code based cryptography. In: Proceedings of Workshop on Codes and Cryptography, pp. 81–90 (2005)
26.
Zurück zum Zitat Goppa, V.D.: A new class of linear correcting codes. Probl. Pederachi Inf. 6(3), 24–34 (1970). (in Russian)MathSciNetMATH Goppa, V.D.: A new class of linear correcting codes. Probl. Pederachi Inf. 6(3), 24–34 (1970). (in Russian)MathSciNetMATH
27.
Zurück zum Zitat Gorenstein, D., Zierler, N.: A class of error-correcting codes in \(p^m\) symbols. J. Soc. Ind. Appl. Math. 9(2), 2007–214 (1961)CrossRef Gorenstein, D., Zierler, N.: A class of error-correcting codes in \(p^m\) symbols. J. Soc. Ind. Appl. Math. 9(2), 2007–214 (1961)CrossRef
28.
Zurück zum Zitat Katz, J., Lindell, Y.: Modern Cryptography. Cryptography and Network Security. Chapmann & Hall/CRC, London (2008)MATH Katz, J., Lindell, Y.: Modern Cryptography. Cryptography and Network Security. Chapmann & Hall/CRC, London (2008)MATH
29.
Zurück zum Zitat McEliece, R.J.: The Theory of Information and Coding Volume 3 of The Encyclopedia of Mathematics and its Applications. Addison-Wesley, Boston (1977) McEliece, R.J.: The Theory of Information and Coding Volume 3 of The Encyclopedia of Mathematics and its Applications. Addison-Wesley, Boston (1977)
31.
Zurück zum Zitat Merkle, R.C., Hellman, M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Int. Symp. Inf. Theory 24(5), 525–530 (1978)CrossRef Merkle, R.C., Hellman, M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Int. Symp. Inf. Theory 24(5), 525–530 (1978)CrossRef
33.
Zurück zum Zitat Molina, S., Sayols, N., Xambó-Descamps, S.: A bootstrap for the number of \({\mathbb{F}}_{q^m}\)-rational points on a curve over \({\mathbb{F}}_q\) (2017) Molina, S., Sayols, N., Xambó-Descamps, S.: A bootstrap for the number of \({\mathbb{F}}_{q^m}\)-rational points on a curve over \({\mathbb{F}}_q\) (2017)
34.
Zurück zum Zitat Niebuhr, R.: Attacking and Defending Code-based Cryptosystems. Ph.D. thesis (2012) Niebuhr, R.: Attacking and Defending Code-based Cryptosystems. Ph.D. thesis (2012)
35.
Zurück zum Zitat Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15, 159–166 (1986)MathSciNetMATH Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15, 159–166 (1986)MathSciNetMATH
37.
Zurück zum Zitat Overbeck, R., Sendrier, N.: Code-based cryptography. In: Post-Quantum Cryptography. Springer. See [10], pp. 95–146 (2009) Overbeck, R., Sendrier, N.: Code-based cryptography. In: Post-Quantum Cryptography. Springer. See [10], pp. 95–146 (2009)
38.
40.
Zurück zum Zitat Peterson, W.W.: Encoding and error-correction procedures for the Bose–Chaudhuri codes. IRE Trans. Inf. Theory 6, 459–470 (1960)MathSciNetCrossRef Peterson, W.W.: Encoding and error-correction procedures for the Bose–Chaudhuri codes. IRE Trans. Inf. Theory 6, 459–470 (1960)MathSciNetCrossRef
41.
Zurück zum Zitat Peterson, W.W., Weldon, E.J.: Error-Correcting Codes (2nd edition). MIT Press, Boston (1972)MATH Peterson, W.W., Weldon, E.J.: Error-Correcting Codes (2nd edition). MIT Press, Boston (1972)MATH
45.
Zurück zum Zitat Repka, M., Zadaj, P.: Overview of the McEliece cryptosystem and its security. Tatra Mt. Math. Publ. 60, 57–83 (2014)MathSciNetMATH Repka, M., Zadaj, P.: Overview of the McEliece cryptosystem and its security. Tatra Mt. Math. Publ. 60, 57–83 (2014)MathSciNetMATH
46.
Zurück zum Zitat Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosistems. Commun. ACM 21, 120–126 (1978)CrossRef Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosistems. Commun. ACM 21, 120–126 (1978)CrossRef
51.
Zurück zum Zitat Sendrier, N.: Cryptosystm̀es à clé publique basés sur les codes correcteurs d’erreurs. Université Pierre et Marie Curie, Institut National de Recherche en Informatique et Automatique, INRIA Rocquencourt. Mémoire d’habilitation à diriger des recherches (2002) Sendrier, N.: Cryptosystm̀es à clé publique basés sur les codes correcteurs d’erreurs. Université Pierre et Marie Curie, Institut National de Recherche en Informatique et Automatique, INRIA Rocquencourt. Mémoire d’habilitation à diriger des recherches (2002)
53.
Zurück zum Zitat Shamir, A.: A polynomial-time algorithm for breaking the basic Merkle–Hellman cryptosystem. IEEE Trans. Inf. Theory 30(5), 699–704 (1984)MathSciNetCrossRef Shamir, A.: A polynomial-time algorithm for breaking the basic Merkle–Hellman cryptosystem. IEEE Trans. Inf. Theory 30(5), 699–704 (1984)MathSciNetCrossRef
54.
Zurück zum Zitat Shor, P.: Algorithms for quantum computation: Discrete logarithms and factorization. In: Symposium of Foundations on Computer Science (Santa Fe, New Mexico, 1994). For a revised and expanded version of this paper, see [53] (1994) Shor, P.: Algorithms for quantum computation: Discrete logarithms and factorization. In: Symposium of Foundations on Computer Science (Santa Fe, New Mexico, 1994). For a revised and expanded version of this paper, see [53] (1994)
55.
Zurück zum Zitat Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)MathSciNetCrossRef Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)MathSciNetCrossRef
60.
Zurück zum Zitat Xambó-Descamps, S., Miret, J.M., Sayols, N.: Intersection Theory and Enumerative Geometry–A Computational Primer. Springer, Berlin (2019) Xambó-Descamps, S., Miret, J.M., Sayols, N.: Intersection Theory and Enumerative Geometry–A Computational Primer. Springer, Berlin (2019)
62.
Zurück zum Zitat Xambó-Descamps, S.: Block Error-correcting Codes: A Computational Primer. Universitext, Springer (2003)CrossRef Xambó-Descamps, S.: Block Error-correcting Codes: A Computational Primer. Universitext, Springer (2003)CrossRef
Metadaten
Titel
Computer Algebra Tales on Goppa Codes and McEliece Cryptography
verfasst von
Narcís Sayols
Sebastià Xambó-Descamps
Publikationsdatum
17.12.2019
Verlag
Springer International Publishing
Erschienen in
Mathematics in Computer Science / Ausgabe 2/2020
Print ISSN: 1661-8270
Elektronische ISSN: 1661-8289
DOI
https://doi.org/10.1007/s11786-019-00444-1

Weitere Artikel der Ausgabe 2/2020

Mathematics in Computer Science 2/2020 Zur Ausgabe

Premium Partner