Christian Wieschebrink

Learn More
In this paper it is shown that the reconstruction of a punctured code from a given code is an NP-complete problem. Based on this observation a modification of code-based cryptosystems such as the Niederreiter scheme is suggested. In particular the modification is resistant to the Sidelnikov-Shestakov attack. Some other possible attacks are reviewed, and(More)
In the project FleGSens, a wireless sensor network (WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information security. The intended prototype consists of 200 sensor nodes for monitoring a 500m long land strip. The system is focused on ensuring integrity and authenticity of(More)
In [1] a Niederreiter-type public-key cryptosystem based on subcodes of generalized Reed-Solomon codes is presented. In this paper an algorithm is proposed which is able to recover the private key of the aforementioned system from the public key and which is considerably faster than a brute force attack. It is shown that the example parameters proposed in(More)
Public key cryptography based on elliptic curves is a promising foundation for energy-scarving pairwise key establishment in wireless sensor networks. Focusing on the Diffie-Hellman key-agreement, identity-based schemes can be applied to provide mechanisms for authentication. The AQ-protocol presented by Arazi et al. introduces such a key establishment(More)
In naher Zukunft sollen Fahrzeuge untereinander und mit Infrastrukturkomponenten direkt kommunizieren, um Unfälle zu verhindern und den Verkehrsfluss zu verbessern. Dazu müssen die versendeten Daten manipulationssicher übertragen werden. Dieser Artikel gibt eine Übersicht über die verwendeten Nachrichtenformate, die kryptographischen Anforderungen und die(More)
A deployment of V2V technology to ITS vehicle stations according to ETSI is in preparation in Europe. ETSI provides two classes of keys and certificates for ITS vehicle stations: long term authentication keys for entity authentication and pseudonymous keys and certificates to assure vehicular privacy. We show that the periodically send Cooperative Awareness(More)
  • 1