2016
DOI: 10.1007/978-3-319-29360-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes

Abstract: Polar codes discovered by Arikan form a very powerful family of codes attaining many information theoretic limits in the fields of error correction and source coding. They have in particular much better decoding capabilities than Goppa codes which places them as a serious alternative in the design of both a public-key encryption schemeà la McEliece and a very efficient signature scheme. Shrestha and Kim proposed in 2014 to use them in order to come up with a new code-based public key cryptosystem. We present a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 43 publications
(32 citation statements)
references
References 31 publications
0
31
0
1
Order By: Relevance
“…Both properties turned to be essential to attack [19] the McEliece system based on polar codes [20]. It might be interesting to use the fact that the permutation group is so large in order to get better decoding performances for the successive cancellation decoder.…”
Section: Introductionmentioning
confidence: 99%
“…Both properties turned to be essential to attack [19] the McEliece system based on polar codes [20]. It might be interesting to use the fact that the permutation group is so large in order to get better decoding performances for the successive cancellation decoder.…”
Section: Introductionmentioning
confidence: 99%
“…We recall the following result on the generic behaviour of random codes with respect to this operation. This provides a distinguisher between random codes and algebraically structured codes such as generalised Reed Solomon codes [19,8], Reed Muller codes [7], polar codes [2] some Goppa codes [12,10] or algebraic geometry codes [9]. For instance, in the case of GRS codes, we have the following result.…”
Section: Schur Product Of Codes and Square Codes Distinguishermentioning
confidence: 98%
“…• If i ∈ I GRS (see (2), (8) and (12) for the definition), puncturing does not affect the dimension of the square code:…”
Section: Identifying Pairs Of Twin Positionsmentioning
confidence: 99%
“…Within this thread of research, there are two heuristic variants [22,23] of the McEliece cryptosystem based on polar codes. e first one [23] was broken by Bardet et al [24] using the structure of the minimum weight codewords.…”
Section: Related Workmentioning
confidence: 99%