期刊文献+

基于枚举错误向量的McEliece公钥密码体制攻击方法 被引量:2

McEliece public key cryptosystem attack algorithm based on enumeration error vector
下载PDF
导出
摘要 对McEliece(M)公钥密码体制的安全性进行研究,该体制中错误向量的汉明重量相对于码长较小,而基于Goppa码的M公钥密码体制存在低重量的公开码字。基于以上分析,提出了枚举错误向量的攻击算法。重点分析了算法中错误翻转比特个数和算法迭代次数等参数对正确解密概率的影响,利用所提算法分析了基于(1024,524,101)Goppa码的M体制安全性。从算法正确解密概率和工作因子2个方面进行仿真分析,仿真实验表明所提算法在码重较低的情况下具有优异的性能。 The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. Considering the above analysis, an attack algorithm based on enumeration error vector was proposed. The effect on probability of correct decryption by the numbers of error flipping bits and algorithm iteration was focused on. And the security of (1 024,524,101) Goppa-based M public key cryptosystem was analyzed. Performance analysis of the proposed algorithm from probability of correct decryption and work factor was simulated, and the experimental results show that the proposed algorithm has a good performance when the code weight is low.
出处 《通信学报》 EI CSCD 北大核心 2014年第5期65-69,共5页 Journal on Communications
基金 国家自然科学基金资助项目(60903199) 高等学校创新引智基地基金资助项目(B08038) 中央高校基本科研业务费专项基金资助项目(K5051201014)~~
关键词 Goppa码 McEliece 低重量码字 枚举错误向量 Goppa code McEliece low weight code word enumeration error vector
  • 相关文献

参考文献12

  • 1LOIDREAU P, SENDRIER N. Weak keys in the McEliece public-key cryptosystem[J]. IEEE Transactions on Information Theory, 2001, 47(3): 1207-1211. 被引量:1
  • 2ADAMS C M, MEIJER H. Security-related comments regarding McEliece's public-key cryptosystem[J]. IEEE Transactions on Infor- marion Theory, 1989, 35(2): 454-455. 被引量:1
  • 3BAR.BIER M, BARRETO P S L M. Key reduction of McEliece's cryptosystem using list decoding[A]. Information Theory Proceedings (ISIT), 2011 IEEE Internarional Symposium IEEE[C]. 2011. 2681- 2685. 被引量:1
  • 4BERNSTE1N D J, LANGE T, PETERS C. Wild Mceliece Incog- nito[M]. Berlin Heidelberg: Springer, 2011. 被引量:1
  • 5MISOCZKI R, BARRETO P S L M. Compact McEliece keys from Goppa codas[A]. Selected Areas in Cryptography[C]. Springer Berlin Heidelberg, 2009.376-392. 被引量:1
  • 6LEE P, BRICKELL E. An observation on the security of McEliece' s public-key cryptosystem[A]. Cryptology EUROCRYPT'88[C]. Davos, Switzerland, 1988.275-280. 被引量:1
  • 7MCELIECE R J. A public-key cryptosystem based on algebraic[J]. Coding Thv, 1978, 4244: 114-116. 被引量:1
  • 8GORDON R K, TEW M D, ELSHERBENI A Z. An efficient finite difference method for finding the electric potential in regions with small perturbarions[A]. Antennas and Propagation Society Interna-tional Symposium, 1992.AP-S. 1992 Digest. Held in Conjunction with: URSI Radio Science Meeting and Nuclear EMP Meeting[C]. Chicago IL, USA, IEEE, 1992.524-527. 被引量:1
  • 9HIROTOMO M, MOHRI M, MORII M. A probabilistic computation method for the weight distribution of low-density parity-check codes[A]x Information Theory 2005 ISIT 2005. Proceedings. International Sym- posium on[C]. Adelaide, SA, IEEE, 2005.2166-2170. 被引量:1
  • 10BERSON T. Failure of the McEliece public-key cryptosystem under and related-megsage attack[A]. Cryptology CRYPTO'97[C]. California, USA, 1997.213-220. 被引量:1

同被引文献6

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部