Skip to main content

Security comments on the Hwang-Chen algebraic-code cryptosystem

  • Session 8: Block Ciphers
  • Conference paper
  • First Online:
Book cover Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

  • 225 Accesses

Abstract

Hwang and Chen have proposed a private-key cryptosystem that provides joint error correction, encryption, and “message” integrity. The scheme is based on algebraic error-correcting codes, using random chaining technique. It was shown that obtaining a combinatorially equivalent code, under ciphertext-only attack, requires O(k2n) operations and O(k2n/2) ciphertexts, where n and k are the length and dimension of the code respectively. It was further claimed that obtaining an equivalent code is not sufficient to “totally” break the system. In this paper, a chosen-plaintext attack is presented that is able to break the system, requiring O[(n - k)2k/2] ciphertexts and O[(n - k)2 k] operations; the attack is based on obtaining a combinatorially equivalent code. Finally, a modified version of the scheme is proposed that overcomes the weaknesses of the original Hwang-Chen scheme; the complexity to break this modified scheme is O(k2n/2) ciphertexts and O(kn2n/2) operations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McEliece, R. J.: Public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report 42–44 (Jan. & Feb. 1978) 114–116. (Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, USA)

    Google Scholar 

  2. Lee, P. J. and Brickell, E. F.: An observation on the security of McEliece's publickey cryptosystem. In C. G. Gunther, editor, Advances in Cryptology-Eurocrypt'87 Proceedings, pages 275–280, Davos, Switzerland, May 25–27 1988, Springer-Verlag (Lecture Notes in Computer Science 330)

    Google Scholar 

  3. Alabbadi, M. and Wicker,S. B.: Combined data encryption and reliability using McEliece's public-key cryptosystem. In International Symposium on Information Theory & Its Applications, pages 263–268, Sydney, Australia, November 20–24 1994.

    Google Scholar 

  4. Rao, T. R. N. and Nam, K.: Private-key algebraic-code encryption. IEEE Trans. Info. Theory, 35(4):829–833, July 1989

    Article  Google Scholar 

  5. Struik, R. and van Tilburg,,J.: The Rao-Nam scheme is insecure against a chosenplaintext attack. In C. Pomerance, editor, Advances in Cryptology-Crypto'87 Proceedings, pages 445–457, Santa Barbara, CA, USA, August 16–20 1987, Springer-Verlag (Lecture Notes in Computer Science 239)

    Google Scholar 

  6. Meijers,,J. and van Tilburg, J.: On the Rao-Nam private-key cryptosystem using linear codes. In IEEE International Symposium on Information Theory, page 126, Budapest, Hungary, June 24–28 1991

    Google Scholar 

  7. Yuanxing, L. and Xinmei, W.: A joint authentication and encryption scheme based on algebraic coding theory. In H. F. Mattson, T. Mora, and T. R. N. Rao, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 9th International Symposium, AAECC-9 Proceedings, pages 241–245, New Orleans, LA, USA, October 1991, Springer-Verlag (Lecture Notes in Computer Science 539)

    Google Scholar 

  8. van Tilburg,.J.: Two chosen-plaintext attacks on the Li-Wang joint authentication and encryption scheme. In G. Cohen, T. Mora, and O. Moreno, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 10th International Symposium, AAECC-10 Proceedings, pages 332–343, San Juan de Puerto Rico, Puerto Rico, May 10–14 1993, Springer-Verlag

    Google Scholar 

  9. Hwang, T. and Chen, Y.: Algebraic-code cryptosystem using random code chaining. In IEEE Conference on Computer and Communication Systems (IEEE TENCON'90), 24–27 September 1990, Hong Kong, Volume 1, pages 194–196

    Google Scholar 

  10. Davies, D. W. and Price, W. L.: Security for Computer Networks. John Wiley and Sons, New York, USA, second addition, 1989

    Google Scholar 

  11. Welsh, D.: Codes and Cryptography. Oxford University Press, Oxford, 1988

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Alabbadi, M.M. (1997). Security comments on the Hwang-Chen algebraic-code cryptosystem. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028483

Download citation

  • DOI: https://doi.org/10.1007/BFb0028483

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics