Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece cryptosystem

E.R. Verheul, J.M. Doumen, H.C.A. Tilborg, van

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Abstract

In this paper we discuss the security of digital signature schemes based on error-- correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the redundancy of public keys. Another weakness is found in the Alabbadi--Wicker scheme, which results in a universal forgery attack against it. This attack shows that the Alabbadi--Wicker scheme fails to implement the necessary property of a digital signature scheme: it is infeasible to find a false signature algorithm D from the public verification algorithm E such that E(D (m)) = m for all messages m. Further analysis shows that this new weakness also applies to the Xinmei scheme.
Original languageEnglish
Title of host publicationInformation, Coding and Mathematics
EditorsM. Blaum, P.G. Farrell, H.C.A. Tilborg, van
Place of PublicationBoston
PublisherKluwer Academic Publishers
Pages99-119
ISBN (Print)1-4020-7079-9
Publication statusPublished - 2002

Fingerprint Dive into the research topics of 'Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece cryptosystem'. Together they form a unique fingerprint.

Cite this