- Full text PDF available (3)
In  a Niederreiter-type public-key cryptosystem based on subcodes of generalized Reed-Solomon codes is presented. In this paper an algorithm is proposed which is able to recover the private key of the aforementioned system from the public key and which is considerably faster than a brute force attack. It is shown that the example parameters proposed in… (More)
In this paper a new structural attack on the McEliece/Nieder-reiter public key cryptosystem based on subcodes of generalized Reed-Solomon codes proposed by Berger and Loidreau is described. It allows the reconstruction of the private key for almost all practical parameter choices in polynomial time with high probability.
In this paper it is shown that the reconstruction of a punctured code from a given code is an NP-complete problem. Based on this observation a modification of code-based cryptosystems such as the Niederreiter scheme is suggested. In particular the modification is resistant to the Sidelnikov-Shestakov attack. Some other possible attacks are reviewed, and… (More)
In the project FleGSens a wireless sensor network (WSN) for the surveillance of critical areas and properties is currently developed. FleGSens is focused on ensuring integrity and authenticity of generated alarms and availability in the presence of an attacker. Hardware • iSense sensor node (16Mhz JN5139), 120 KB flash • IEEE 802.15.4 Radio, hardware AES… (More)
Public key cryptography based on elliptic curves is a promising foundation for energy-scarving pairwise key establishment in wireless sensor networks. Focusing on the Diffie-Hellman key-agreement, identity-based schemes can be applied to provide mechanisms for authentication. The AQ-protocol presented by Arazi et al. introduces such a key establishment… (More)
In naher Zukunft sollen Fahrzeuge untereinander und mit Infrastrukturkomponenten direkt kommunizieren, um Unfälle zu verhindern und den Verkehrsfluss zu verbessern. Dazu müssen die versendeten Daten manipulationssicher übertragen werden. Dieser Artikel gibt eine Übersicht über die verwendeten Nachrichtenformate, die kryptographischen Anforderungen und die… (More)
A deployment of V2V technology to ITS vehicle stations according to ETSI is in preparation in Europe. ETSI provides two classes of keys and certificates for ITS vehicle stations: long term authentication keys for entity authentication and pseudonymous keys and certificates to assure vehicular privacy. We show that the periodically send Cooperative Awareness… (More)