Modern variations of McEliece and Niederreiter cryptosystems
Classical cryptosystems proposed by Robert McEliece (1978) and Harold Niederreiter (1986) and their modern variations are studied. A detailed review of five code-based public key cryptosystems has been presented. It is shown that some of the modern interpretations of the classical McEliece and Niede...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University)
2022-04-01
|
Series: | Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki |
Subjects: | |
Online Access: | https://ntv.ifmo.ru/file/article/21142.pdf |
_version_ | 1818048708142432256 |
---|---|
author | Vadim V. Davydov Vladislav V. Beliaev Elizar F. Kustov Anton G. Leevik Sergey V. Bezzateev |
author_facet | Vadim V. Davydov Vladislav V. Beliaev Elizar F. Kustov Anton G. Leevik Sergey V. Bezzateev |
author_sort | Vadim V. Davydov |
collection | DOAJ |
description | Classical cryptosystems proposed by Robert McEliece (1978) and Harold Niederreiter (1986) and their modern variations are studied. A detailed review of five code-based public key cryptosystems has been presented. It is shown that some of the modern interpretations of the classical McEliece and Niederreiter cryptosystems have significant issues. In particular, it has been established that the XGRS cryptosystem based on extended Reed-Solomon codes does not provide the declared level of security against the information set decoding attack, and also has a number of inaccuracies. It is shown that the time of key generation and decryption in modern cryptosystems is quite large, and the public and private
keys take up a large amount of memory. The inaccuracies of the considered schemes revealed in this work can be used to improve and adjust the systems, as well as to build a more accurate assessment of their security level and efficiency. The presented cryptosystems can be considered as standards for post-quantum cryptography and can be used to protect data after development of powerful quantum computers. |
first_indexed | 2024-12-10T10:25:58Z |
format | Article |
id | doaj.art-ace92de574e14d89a5f6076d23d2a48b |
institution | Directory Open Access Journal |
issn | 2226-1494 2500-0373 |
language | English |
last_indexed | 2024-12-10T10:25:58Z |
publishDate | 2022-04-01 |
publisher | Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University) |
record_format | Article |
series | Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki |
spelling | doaj.art-ace92de574e14d89a5f6076d23d2a48b2022-12-22T01:52:43ZengSaint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University)Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki2226-14942500-03732022-04-0122232433110.17586/2226-1494-2022-22-2-324-331Modern variations of McEliece and Niederreiter cryptosystemsVadim V. Davydov0https://orcid.org/0000-0002-5544-2434Vladislav V. Beliaev1https://orcid.org/0000-0002-1067-7483Elizar F. Kustov2https://orcid.org/0000-0002-0191-1178Anton G. Leevik3https://orcid.org/0000-0003-1823-7877Sergey V. Bezzateev4https://orcid.org/0000-0002-0924-6221Lecturer, ITMO University, 197101, Saint Petersburg, Russian Federation, sc 57203909696Laboratory Assistant, ITMO University, 197101, Saint Petersburg, Russian Federation, sc 57217737570PhD Student, ITMO University, 197101, Saint Petersburg, Russian FederationEngineer, ITMO University, 197101, Saint Petersburg, Russian Federation, sc 57219714571D. Sc., Full Professor, Associate Professor, ITMO University, 197101, Saint Petersburg, Russian Federation; Saint- Petersburg State University of Aerospace Instrumentation, Head of department, 190000, Saint Petersburg, Russian Federation, sc 6602425996Classical cryptosystems proposed by Robert McEliece (1978) and Harold Niederreiter (1986) and their modern variations are studied. A detailed review of five code-based public key cryptosystems has been presented. It is shown that some of the modern interpretations of the classical McEliece and Niederreiter cryptosystems have significant issues. In particular, it has been established that the XGRS cryptosystem based on extended Reed-Solomon codes does not provide the declared level of security against the information set decoding attack, and also has a number of inaccuracies. It is shown that the time of key generation and decryption in modern cryptosystems is quite large, and the public and private keys take up a large amount of memory. The inaccuracies of the considered schemes revealed in this work can be used to improve and adjust the systems, as well as to build a more accurate assessment of their security level and efficiency. The presented cryptosystems can be considered as standards for post-quantum cryptography and can be used to protect data after development of powerful quantum computers.https://ntv.ifmo.ru/file/article/21142.pdfpost-quantum cryptographymceliece cryptosystemniederreiter cryptosystembinary goppa codesgeneralized reed-solomon codes |
spellingShingle | Vadim V. Davydov Vladislav V. Beliaev Elizar F. Kustov Anton G. Leevik Sergey V. Bezzateev Modern variations of McEliece and Niederreiter cryptosystems Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki post-quantum cryptography mceliece cryptosystem niederreiter cryptosystem binary goppa codes generalized reed-solomon codes |
title | Modern variations of McEliece and Niederreiter cryptosystems |
title_full | Modern variations of McEliece and Niederreiter cryptosystems |
title_fullStr | Modern variations of McEliece and Niederreiter cryptosystems |
title_full_unstemmed | Modern variations of McEliece and Niederreiter cryptosystems |
title_short | Modern variations of McEliece and Niederreiter cryptosystems |
title_sort | modern variations of mceliece and niederreiter cryptosystems |
topic | post-quantum cryptography mceliece cryptosystem niederreiter cryptosystem binary goppa codes generalized reed-solomon codes |
url | https://ntv.ifmo.ru/file/article/21142.pdf |
work_keys_str_mv | AT vadimvdavydov modernvariationsofmcelieceandniederreitercryptosystems AT vladislavvbeliaev modernvariationsofmcelieceandniederreitercryptosystems AT elizarfkustov modernvariationsofmcelieceandniederreitercryptosystems AT antongleevik modernvariationsofmcelieceandniederreitercryptosystems AT sergeyvbezzateev modernvariationsofmcelieceandniederreitercryptosystems |