1995
DOI: 10.1007/bf01390769
|View full text |Cite
|
Sign up to set email alerts
|

Severely denting the Gabidulin version of the McEliece Public Key Cryptosystem

Abstract: Abstract. Gabidulin has proposed a version of the McEliece Public Key Cryptosystem using what he calls maximum rank distance (MRD) codes in place of Goppa codes. It is shown how to break such a system by finding a trapdoor to it. For the size of code he suggests this can be done in about a week on a fast personal computer. The attack can be thwarted by increasing the size of the code, but the advantages claimed for the Gabidulin version over the MeEliece version are then largely lost.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0
1

Year Published

1996
1996
2017
2017

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 65 publications
(43 citation statements)
references
References 6 publications
0
42
0
1
Order By: Relevance
“…For example, Gabidulin et al [5] tried using maximum-rank-distance codes. These schemes were shown to be insecure by Gibson [6,7]. In any event, such code replacements would not prevent our attack, which does not depend on the structure of the code.…”
Section: Remar~mentioning
confidence: 97%
“…For example, Gabidulin et al [5] tried using maximum-rank-distance codes. These schemes were shown to be insecure by Gibson [6,7]. In any event, such code replacements would not prevent our attack, which does not depend on the structure of the code.…”
Section: Remar~mentioning
confidence: 97%
“…Gibson in a series of work [11,12] developed attacks that break the GPT public key cryptosystem. Several variants of the GPT public key cryptosystem were introduced to withstand Gibson's attack [7,22].…”
Section: Gibson's Attackmentioning
confidence: 99%
“…That is the reason why their use in the GPT cryptosystem has been the subject to several attacks. Gibson was the first to prove the weakness of the system through a series of successful attacks [Gib95,Gib96]. Following these failures, the first works which modified the GPT scheme to avoid Gibson's attack were published in [GO01,GOHA03].…”
Section: Introductionmentioning
confidence: 99%