Loading…

Weak keys in the McEliece public-key cryptosystem

We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was chosen with a binary generator polynomial. Furthermore, whenever such a weak key is used, we present an attack which can be completed, for codes of length 1024 and dimension 5...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on information theory 2001-03, Vol.47 (3), p.1207-1211
Main Authors: Loidreau, P., Sendrier, N.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c405t-70260cfa4b90a75129708547b2e4999403fbbc138d6dbf6ee2bfdddf7dd069cc3
cites cdi_FETCH-LOGICAL-c405t-70260cfa4b90a75129708547b2e4999403fbbc138d6dbf6ee2bfdddf7dd069cc3
container_end_page 1211
container_issue 3
container_start_page 1207
container_title IEEE transactions on information theory
container_volume 47
creator Loidreau, P.
Sendrier, N.
description We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was chosen with a binary generator polynomial. Furthermore, whenever such a weak key is used, we present an attack which can be completed, for codes of length 1024 and dimension 524, with a large, but feasible amount of computation.
doi_str_mv 10.1109/18.915687
format article
fullrecord <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_proquest_miscellaneous_914650772</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>915687</ieee_id><sourcerecordid>914650772</sourcerecordid><originalsourceid>FETCH-LOGICAL-c405t-70260cfa4b90a75129708547b2e4999403fbbc138d6dbf6ee2bfdddf7dd069cc3</originalsourceid><addsrcrecordid>eNp9kc1Lw0AQxRdRsFYPXj0FD4qH1J1kP4-lVCtUvCgel81mQtOmTcwmQv57U1IqePA0zLwfb2Z4hFwDnQBQ_QhqooELJU_ICDiXoRacnZIRpaBCzZg6Jxfer_uWcYhGBD7RboINdj7Id0GzwuDVzYscHQZVmxS5C3stcHVXNaXvfIPbS3KW2cLj1aGOycfT_H22CJdvzy-z6TJ0jPImlDQS1GWWJZpa2e_SkirOZBIh01ozGmdJ4iBWqUiTTCBGSZamaSbTlArtXDwmD4PvyhamqvOtrTtT2twspkuzn1GqhYyV-oaevR_Yqi6_WvSN2ebeYVHYHZatNxqY4FTKqCfv_iUjJQREbG95-wdcl2296z82oLmSEYf490ZXl97XmB0PBWr2eRhQZsijZ28GNkfEI3cQfwAnqoJn</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>195872513</pqid></control><display><type>article</type><title>Weak keys in the McEliece public-key cryptosystem</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Loidreau, P. ; Sendrier, N.</creator><creatorcontrib>Loidreau, P. ; Sendrier, N.</creatorcontrib><description>We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was chosen with a binary generator polynomial. Furthermore, whenever such a weak key is used, we present an attack which can be completed, for codes of length 1024 and dimension 524, with a large, but feasible amount of computation.</description><identifier>ISSN: 0018-9448</identifier><identifier>EISSN: 1557-9654</identifier><identifier>DOI: 10.1109/18.915687</identifier><identifier>CODEN: IETTAW</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Computation ; Cryptography ; Generators ; Goppa codes ; Information theory ; Keys</subject><ispartof>IEEE transactions on information theory, 2001-03, Vol.47 (3), p.1207-1211</ispartof><rights>Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Mar 2001</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c405t-70260cfa4b90a75129708547b2e4999403fbbc138d6dbf6ee2bfdddf7dd069cc3</citedby><cites>FETCH-LOGICAL-c405t-70260cfa4b90a75129708547b2e4999403fbbc138d6dbf6ee2bfdddf7dd069cc3</cites><orcidid>0000-0001-9438-6773</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/915687$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,315,786,790,891,27957,27958,55147</link.rule.ids><backlink>$$Uhttps://ensta-paris.hal.science/hal-00967388$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Loidreau, P.</creatorcontrib><creatorcontrib>Sendrier, N.</creatorcontrib><title>Weak keys in the McEliece public-key cryptosystem</title><title>IEEE transactions on information theory</title><addtitle>TIT</addtitle><description>We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was chosen with a binary generator polynomial. Furthermore, whenever such a weak key is used, we present an attack which can be completed, for codes of length 1024 and dimension 524, with a large, but feasible amount of computation.</description><subject>Algorithms</subject><subject>Computation</subject><subject>Cryptography</subject><subject>Generators</subject><subject>Goppa codes</subject><subject>Information theory</subject><subject>Keys</subject><issn>0018-9448</issn><issn>1557-9654</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2001</creationdate><recordtype>article</recordtype><recordid>eNp9kc1Lw0AQxRdRsFYPXj0FD4qH1J1kP4-lVCtUvCgel81mQtOmTcwmQv57U1IqePA0zLwfb2Z4hFwDnQBQ_QhqooELJU_ICDiXoRacnZIRpaBCzZg6Jxfer_uWcYhGBD7RboINdj7Id0GzwuDVzYscHQZVmxS5C3stcHVXNaXvfIPbS3KW2cLj1aGOycfT_H22CJdvzy-z6TJ0jPImlDQS1GWWJZpa2e_SkirOZBIh01ozGmdJ4iBWqUiTTCBGSZamaSbTlArtXDwmD4PvyhamqvOtrTtT2twspkuzn1GqhYyV-oaevR_Yqi6_WvSN2ebeYVHYHZatNxqY4FTKqCfv_iUjJQREbG95-wdcl2296z82oLmSEYf490ZXl97XmB0PBWr2eRhQZsijZ28GNkfEI3cQfwAnqoJn</recordid><startdate>20010301</startdate><enddate>20010301</enddate><creator>Loidreau, P.</creator><creator>Sendrier, N.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0001-9438-6773</orcidid></search><sort><creationdate>20010301</creationdate><title>Weak keys in the McEliece public-key cryptosystem</title><author>Loidreau, P. ; Sendrier, N.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c405t-70260cfa4b90a75129708547b2e4999403fbbc138d6dbf6ee2bfdddf7dd069cc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Algorithms</topic><topic>Computation</topic><topic>Cryptography</topic><topic>Generators</topic><topic>Goppa codes</topic><topic>Information theory</topic><topic>Keys</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Loidreau, P.</creatorcontrib><creatorcontrib>Sendrier, N.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on information theory</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Loidreau, P.</au><au>Sendrier, N.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Weak keys in the McEliece public-key cryptosystem</atitle><jtitle>IEEE transactions on information theory</jtitle><stitle>TIT</stitle><date>2001-03-01</date><risdate>2001</risdate><volume>47</volume><issue>3</issue><spage>1207</spage><epage>1211</epage><pages>1207-1211</pages><issn>0018-9448</issn><eissn>1557-9654</eissn><coden>IETTAW</coden><notes>ObjectType-Article-2</notes><notes>SourceType-Scholarly Journals-1</notes><notes>ObjectType-Feature-1</notes><notes>content type line 23</notes><abstract>We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was chosen with a binary generator polynomial. Furthermore, whenever such a weak key is used, we present an attack which can be completed, for codes of length 1024 and dimension 524, with a large, but feasible amount of computation.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/18.915687</doi><tpages>5</tpages><orcidid>https://orcid.org/0000-0001-9438-6773</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0018-9448
ispartof IEEE transactions on information theory, 2001-03, Vol.47 (3), p.1207-1211
issn 0018-9448
1557-9654
language eng
recordid cdi_proquest_miscellaneous_914650772
source IEEE Electronic Library (IEL) Journals
subjects Algorithms
Computation
Cryptography
Generators
Goppa codes
Information theory
Keys
title Weak keys in the McEliece public-key cryptosystem
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-09-22T18%3A25%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Weak%20keys%20in%20the%20McEliece%20public-key%20cryptosystem&rft.jtitle=IEEE%20transactions%20on%20information%20theory&rft.au=Loidreau,%20P.&rft.date=2001-03-01&rft.volume=47&rft.issue=3&rft.spage=1207&rft.epage=1211&rft.pages=1207-1211&rft.issn=0018-9448&rft.eissn=1557-9654&rft.coden=IETTAW&rft_id=info:doi/10.1109/18.915687&rft_dat=%3Cproquest_hal_p%3E914650772%3C/proquest_hal_p%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c405t-70260cfa4b90a75129708547b2e4999403fbbc138d6dbf6ee2bfdddf7dd069cc3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=195872513&rft_id=info:pmid/&rft_ieee_id=915687&rfr_iscdi=true