TY - GEN
T1 - Wild McEliece Incognito
AU - Bernstein, D.J.
AU - Lange, T.
AU - Peters, C.P.
PY - 2011
Y1 - 2011
N2 - The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of security against all attacks known. However, the cryptosystem drops one of the confidence-inspiring shields built into the original McEliece cryptosystem, namely a large pool of Goppa polynomials to choose from.
This paper shows how to achieve almost all of the same reduction in key size while preserving this shield. Even if support splitting could be (1) generalized to handle an unknown support set and (2) sped up by a square-root factor, polynomial-searching attacks in the new system will still be at least as hard as information-set decoding.
Furthermore, this paper presents a set of concrete cryptanalytic challenges to encourage the cryptographic community to study the security of code-based cryptography. The challenges range through codes over F2, F3, …, F32, and cover two different levels of how much the wildness is hidden.
AB - The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of security against all attacks known. However, the cryptosystem drops one of the confidence-inspiring shields built into the original McEliece cryptosystem, namely a large pool of Goppa polynomials to choose from.
This paper shows how to achieve almost all of the same reduction in key size while preserving this shield. Even if support splitting could be (1) generalized to handle an unknown support set and (2) sped up by a square-root factor, polynomial-searching attacks in the new system will still be at least as hard as information-set decoding.
Furthermore, this paper presents a set of concrete cryptanalytic challenges to encourage the cryptographic community to study the security of code-based cryptography. The challenges range through codes over F2, F3, …, F32, and cover two different levels of how much the wildness is hidden.
U2 - 10.1007/978-3-642-25405-5_16
DO - 10.1007/978-3-642-25405-5_16
M3 - Conference contribution
SN - 978-3-642-25404-8
T3 - Lecture Notes in Computer Science
SP - 244
EP - 254
BT - Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings)
A2 - Yang, B.Y.
PB - Springer
CY - Berlin
ER -