Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes

@article{Otmani2008CryptanalysisOT,
  title={Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes},
  author={Ayoub Otmani and Jean-Pierre Tillich and L{\'e}onard Dallot},
  journal={Mathematics in Computer Science},
  year={2008},
  volume={3},
  pages={129-140}
}
We cryptanalyse here two variants of the McEliece cryptosystem based on quasi-cyclic codes. Both aim at reducing the key size by restricting the public and secret generator matrices to be in quasi-cyclic form. The first variant considers subcodes of a primitive BCH code. The aforementioned constraint on the public and secret keys implies to choose very structured permutations. We prove that this variant is not secure by producing many linear equations that the entries of the secret permutation… CONTINUE READING
BETA

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 55 CITATIONS, ESTIMATED 85% COVERAGE

Reducing Key Length of the McEliece Cryptosystem

VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Compact McEliece Keys from Goppa Codes

  • IACR Cryptology ePrint Archive
  • 2009
VIEW 4 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes

  • IACR Cryptology ePrint Archive
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

Two Countermeasures against Reaction Attacks on LEDApkc and other QC-MDPC and QC-LDPC based McEliece Cryptosystems in ARQ Setting Heuristic Discussion

  • 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
  • 2018
VIEW 2 EXCERPTS
CITES METHODS & BACKGROUND

FILTER CITATIONS BY YEAR

2008
2019

CITATION STATISTICS

  • 3 Highly Influenced Citations

  • Averaged 5 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 19 REFERENCES

Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes

  • 2007 IEEE International Symposium on Information Theory
  • 2007
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Lightweight code-based identification and signature

  • 2007 IEEE International Symposium on Information Theory
  • 2007
VIEW 1 EXCERPT

SYND: a Fast Code-Based Stream Cipher with a Security Reduction

  • 2007 IEEE International Symposium on Information Theory
  • 2007
VIEW 1 EXCERPT

Using low density parity check codes in the McEliece cryptosystem

  • 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)
  • 2000
VIEW 1 EXCERPT