Abstract
Hwang and Chen have proposed a private-key cryptosystem that provides joint error correction, encryption, and “message” integrity. The scheme is based on algebraic error-correcting codes, using random chaining technique. It was shown that obtaining a combinatorially equivalent code, under ciphertext-only attack, requires O(k2n) operations and O(k2n/2) ciphertexts, where n and k are the length and dimension of the code respectively. It was further claimed that obtaining an equivalent code is not sufficient to “totally” break the system. In this paper, a chosen-plaintext attack is presented that is able to break the system, requiring O[(n - k)2k/2] ciphertexts and O[(n - k)2 k] operations; the attack is based on obtaining a combinatorially equivalent code. Finally, a modified version of the scheme is proposed that overcomes the weaknesses of the original Hwang-Chen scheme; the complexity to break this modified scheme is O(k2n/2) ciphertexts and O(kn2n/2) operations.
Preview
Unable to display preview. Download preview PDF.
References
McEliece, R. J.: Public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report 42–44 (Jan. & Feb. 1978) 114–116. (Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, USA)
Lee, P. J. and Brickell, E. F.: An observation on the security of McEliece's publickey cryptosystem. In C. G. Gunther, editor, Advances in Cryptology-Eurocrypt'87 Proceedings, pages 275–280, Davos, Switzerland, May 25–27 1988, Springer-Verlag (Lecture Notes in Computer Science 330)
Alabbadi, M. and Wicker,S. B.: Combined data encryption and reliability using McEliece's public-key cryptosystem. In International Symposium on Information Theory & Its Applications, pages 263–268, Sydney, Australia, November 20–24 1994.
Rao, T. R. N. and Nam, K.: Private-key algebraic-code encryption. IEEE Trans. Info. Theory, 35(4):829–833, July 1989
Struik, R. and van Tilburg,,J.: The Rao-Nam scheme is insecure against a chosenplaintext attack. In C. Pomerance, editor, Advances in Cryptology-Crypto'87 Proceedings, pages 445–457, Santa Barbara, CA, USA, August 16–20 1987, Springer-Verlag (Lecture Notes in Computer Science 239)
Meijers,,J. and van Tilburg, J.: On the Rao-Nam private-key cryptosystem using linear codes. In IEEE International Symposium on Information Theory, page 126, Budapest, Hungary, June 24–28 1991
Yuanxing, L. and Xinmei, W.: A joint authentication and encryption scheme based on algebraic coding theory. In H. F. Mattson, T. Mora, and T. R. N. Rao, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 9th International Symposium, AAECC-9 Proceedings, pages 241–245, New Orleans, LA, USA, October 1991, Springer-Verlag (Lecture Notes in Computer Science 539)
van Tilburg,.J.: Two chosen-plaintext attacks on the Li-Wang joint authentication and encryption scheme. In G. Cohen, T. Mora, and O. Moreno, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 10th International Symposium, AAECC-10 Proceedings, pages 332–343, San Juan de Puerto Rico, Puerto Rico, May 10–14 1993, Springer-Verlag
Hwang, T. and Chen, Y.: Algebraic-code cryptosystem using random code chaining. In IEEE Conference on Computer and Communication Systems (IEEE TENCON'90), 24–27 September 1990, Hong Kong, Volume 1, pages 194–196
Davies, D. W. and Price, W. L.: Security for Computer Networks. John Wiley and Sons, New York, USA, second addition, 1989
Welsh, D.: Codes and Cryptography. Oxford University Press, Oxford, 1988
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Alabbadi, M.M. (1997). Security comments on the Hwang-Chen algebraic-code cryptosystem. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028483
Download citation
DOI: https://doi.org/10.1007/BFb0028483
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive