Abstract
The optimal values for the parameters of the McEliece public key cryptosystem are computed. Using these values improves the cryptanalytic complexity of the system and decreases its data expansion. Secondly it is shown that the likelihood of the existence of more than one trapdoor in the system is very small.
Keywords
August 1986
This work was partially supported by Grant #A0282 from the Natural Scienccs and Engineering Research Council.
Download to read the full chapter text
Chapter PDF
References
Adams, C.M. (1985), Examination and Analysis of McEliece’s Public-Key Cryptosystem, M.Sc. Thesis, Department of Computing and Information Science, Queen’s University, Kingston.
Berlckamp, E.R. (1973), Goppa Codes, IEEE. Transactions on Information Theory, Vol. IT-19 #5 (Sept.).
Brickell, E.F. (1985), Breaking Iterated Knapsacks, Advances in Cryptology: Proceedings of Crypto 84, Blakley, G.R., Chaum, D. (Editors), Springer-Verlag, Berlin.
Bunch, J., Hopcroft, J.E. (1974), Triangular Factorization and Inversion by Fast Matrix Multiplication, Mathematics of Computation, Vol. 28; 125.
McEliece, R.J. (1977), The Theory of Information and Coding (Volume 3 of the Encyclopedia of Mathematics and its Applications), Addison-Wesley, Reading, Mass.
McEliece, R.J. (1978), A Public-Key Cryptosystem Based on Algebraic Coding Theory, DSN Progress Report (Jan, Feb), Jet Propulsion Laboratory, California Institute of Technology, Pasadena, Calif.
Merkle, R., Hellman, M (1978) Hiding Information and Signatures in Trapdoor Knapsacks, IEEE. Transactions on Information Theory, Vol. IT-24 #5 (Sept.)
Pan, V. (1978), Strassen’s Algorithm is not Optimal, the 19th Annual Symposium on the Foundations of Computer Science.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Adams, C.M., Meijer, H. (1988). Security-Related Comments Regarding McEliece’s Public-Key Cryptosystem. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_20
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive