Implementation of McEliece Algorithm in Code-Based Cryptography

Gespeichert in:
Bibliographische Detailangaben
Titel: Implementation of McEliece Algorithm in Code-Based Cryptography
Autoren: null Erikson Putra Perdana Lumbantobing, null Githa Sabrina Pasaribu, null Nitamasi Finowa’a, null Oktoma Jaya Halawa, null Lucanhi Situmeang
Quelle: Jurnal Teknik Indonesia. 3:61-67
Verlagsinformationen: Science Analytical Institute, 2024.
Publikationsjahr: 2024
Beschreibung: The McEliece algorithm is an asymmetric cryptosystem based on error-correcting codes, relying on the complexity of the syndrome decoding problem for its security. This study discusses the implementation of the McEliece algorithm using the Hamming(7,4) code in the encryption and decryption process of binary messages. Encryption is done by generating a public key consisting of a disguised generator matrix G′, a permutation matrix P, and a non-singular matrix SSS. The binary message is encrypted by adding controlled noise to increase security. In the decryption phase, the received message is processed using reverse permutation and error detection with a parity check matrix to recover the original message. Experiments are carried out by implementing the algorithm in Python, with results showing successful encryption and decryption of messages according to the McEliece theoretical framework. This study confirms that the Hamming code can be used as a simplified approach to the implementation of McEliece, although with security limitations compared to Goppa codes.
Publikationsart: Article
ISSN: 2964-0490
DOI: 10.58471/ju-ti.v3i02.666
Dokumentencode: edsair.doi...........a96c232fcd270949fa939be3605d11eb
Datenbank: OpenAIRE
Beschreibung
Abstract:The McEliece algorithm is an asymmetric cryptosystem based on error-correcting codes, relying on the complexity of the syndrome decoding problem for its security. This study discusses the implementation of the McEliece algorithm using the Hamming(7,4) code in the encryption and decryption process of binary messages. Encryption is done by generating a public key consisting of a disguised generator matrix G′, a permutation matrix P, and a non-singular matrix SSS. The binary message is encrypted by adding controlled noise to increase security. In the decryption phase, the received message is processed using reverse permutation and error detection with a parity check matrix to recover the original message. Experiments are carried out by implementing the algorithm in Python, with results showing successful encryption and decryption of messages according to the McEliece theoretical framework. This study confirms that the Hamming code can be used as a simplified approach to the implementation of McEliece, although with security limitations compared to Goppa codes.
ISSN:29640490
DOI:10.58471/ju-ti.v3i02.666