Lecture Notes in Computer Science
DOI: 10.1007/3-540-46416-6_41
|View full text |Cite
|
Sign up to set email alerts
|

Ideals over a Non-Commutative Ring and their Application in Cryptology

Abstract: A new modification of the McEliece public-key cryptosystem is proposed that employs the so-called maximum-rank-distance (MRD) codes in place of Goppa codes and that hides the generator matrix of the MRD code by addition of a randomly-chosen matrix. A short review of the mathematical background required for the construction of MRD codes is given. The cryptanalytic work function for the modified McEliece system is shown to be much greater than that of the original system. Extensions of the rank metric are also c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
181
0
3

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 237 publications
(190 citation statements)
references
References 5 publications
3
181
0
3
Order By: Relevance
“…Currently one of the two best known attacks to decode rank distance codes is based on MinRank [11,37]. Therefore MinRank is essential to the security of Chen and GPT public key schemes [14,4,11]. MinRank also appears in attacks known on the HFE [32,8,10], TTM cryptosystem [19] and Shamir's birational signature scheme [30,6,7].…”
Section: Related Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Currently one of the two best known attacks to decode rank distance codes is based on MinRank [11,37]. Therefore MinRank is essential to the security of Chen and GPT public key schemes [14,4,11]. MinRank also appears in attacks known on the HFE [32,8,10], TTM cryptosystem [19] and Shamir's birational signature scheme [30,6,7].…”
Section: Related Problemsmentioning
confidence: 99%
“…MinRank in fact contains SD and thus is also probably exponential. It also contains the decoding problem for rank-distance codes of Gabidulin, used in public-key authentication scheme of Chen [4] cryptanalysed in [37,11], and also used in the public-key encryption scheme GPT [14]. The MinRank problem, not always named so, has many applications in cryptanalysis of various schemes such as Shamir's birational schemes [30,6,7] cryptanalysed by Coppersmith, Stern and Vaudenay solving a MinRank with a small rank.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Gabidulin et al [5] tried using maximum-rank-distance codes. These schemes were shown to be insecure by Gibson [6,7].…”
Section: Remar~mentioning
confidence: 99%
“…By viewing any finite extension of finite fields F/K as a linear space over K of dimension m > 1 then for any positive integer n, the ambient space F n can also be viewed as the space of m × n matrices. In [GPT91] Gabidulin, Paramonov and Tretjakov proposed the first rank-metric based encryption scheme. This scheme can be seen as an analog of the McEliece's one but based on the class of Gabidulin codes.…”
Section: Introductionmentioning
confidence: 99%
“…This transformation is a probabilistic algorithm that adds some randomness to its input G . Originally, the authors in [GPT91] proposed to use a distortion transformation that outputs (a generator matrix of) the code G + R where R is random code with a prescribed dimension t R . The presence of R has however an impact: the sender has to add an error vector whose rank weight is t pub = t − t R where t is the error correction capability of the G .…”
Section: Introductionmentioning
confidence: 99%