RM Code-Based Post Quantum Cryptosystems ; RM부호 기반 포스트 양자 암호시스템

Uloženo v:
Podrobná bibliografie
Název: RM Code-Based Post Quantum Cryptosystems ; RM부호 기반 포스트 양자 암호시스템
Autoři: 이위직
Přispěvatelé: 노종선, 공과대학 전기·컴퓨터공학부
Informace o vydavateli: 서울대학교 대학원
Rok vydání: 2018
Sbírka: Seoul National University: S-Space
Témata: Code-based cryptosystems, Courtois, Finiasz, and Sendrier (CFS) signature, McEliece cryptosystem, m-sequences, p-ary sequences, post-quantum cryptosystem, public key cryptography, puncturing, Reed-Muller (RM) codes, Weil bound, 621.3
Popis: 학위논문 (박사)-- 서울대학교 대학원 : 공과대학 전기·컴퓨터공학부, 2018. 2. 노종선. ; In this dissertation, Reed-Muller (RM) code-based cryptosystems and two families of p-ary sequences are considered. Three main contributions are given as follows. First, McEliece cryptosystems based on punctured RM codes are proposed. It is shown that the already known attacks, such as the Minder-Shokrollahis attack, the Chizhov-Borodins attack, and the square code attack, do not work for the proposed RM code-based McEliece cryptosystems. We find an optimal puncturing scheme to prevent the previously known attacks for the proposed RM code-based cryptosystems in a sense that the exact locations of puncturing positions with the minimum number of punctured columns of the generator matrix should be found for attacking. It is important to carry out the minimum number of puncturing since the modification of codes by puncturing can reduce security level. In addition, the square code attack can also be prevented in the proposed RM code-based McEliece cryptosystems by using both the proposed puncturing and random insertion methods. Second, a new signature scheme based on a punctured Reed-Muller (RM) code with random insertion is proposed. The proposed signature scheme improves the Goppa code-based signature scheme developed by Courtois, Finiasz, and Sendrier (CFS). The CFS signature scheme has certain drawbacks in terms of scaling of the parameters and a lack of existential unforgeability under adaptive chosen message attacks (EUF-CMA) security proof. Further, the proposed modified RM code-based signature scheme can use complete decoding, which can be implemented using a recursive decoding method and thus syndromes for errors larger than the error correctability can be decoded for signing, which improves the probability of successful signing and reduces the signing time. Using the puncturing and insertion methods, the proposed RM code-based signature scheme can avoid some known attacks for RM code-based cryptosystems. The parameters of the proposed signature scheme ...
Druh dokumentu: thesis
Popis souboru: application/pdf; 2552025 bytes
Jazyk: English
Relation: 000000151452; https://hdl.handle.net/10371/140697
Dostupnost: https://hdl.handle.net/10371/140697
Přístupové číslo: edsbas.F7227C6D
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://hdl.handle.net/10371/140697#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=%EC%9D%B4%EC%9C%84%EC%A7%81
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.F7227C6D
RelevancyScore: 794
AccessLevel: 3
PubType: Dissertation/ Thesis
PubTypeId: dissertation
PreciseRelevancyScore: 794.436645507813
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: RM Code-Based Post Quantum Cryptosystems ; RM부호 기반 포스트 양자 암호시스템
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22이위직%22">이위직</searchLink>
– Name: Author
  Label: Contributors
  Group: Au
  Data: 노종선<br />공과대학 전기·컴퓨터공학부
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: 서울대학교 대학원
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2018
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: Seoul National University: S-Space
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Code-based+cryptosystems%22">Code-based cryptosystems</searchLink><br /><searchLink fieldCode="DE" term="%22Courtois%22">Courtois</searchLink><br /><searchLink fieldCode="DE" term="%22Finiasz%22">Finiasz</searchLink><br /><searchLink fieldCode="DE" term="%22and+Sendrier+%28CFS%29+signature%22">and Sendrier (CFS) signature</searchLink><br /><searchLink fieldCode="DE" term="%22McEliece+cryptosystem%22">McEliece cryptosystem</searchLink><br /><searchLink fieldCode="DE" term="%22m-sequences%22">m-sequences</searchLink><br /><searchLink fieldCode="DE" term="%22p-ary+sequences%22">p-ary sequences</searchLink><br /><searchLink fieldCode="DE" term="%22post-quantum+cryptosystem%22">post-quantum cryptosystem</searchLink><br /><searchLink fieldCode="DE" term="%22public+key+cryptography%22">public key cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22puncturing%22">puncturing</searchLink><br /><searchLink fieldCode="DE" term="%22Reed-Muller+%28RM%29+codes%22">Reed-Muller (RM) codes</searchLink><br /><searchLink fieldCode="DE" term="%22Weil+bound%22">Weil bound</searchLink><br /><searchLink fieldCode="DE" term="%22621%2E3%22">621.3</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: 학위논문 (박사)-- 서울대학교 대학원 : 공과대학 전기·컴퓨터공학부, 2018. 2. 노종선. ; In this dissertation, Reed-Muller (RM) code-based cryptosystems and two families of p-ary sequences are considered. Three main contributions are given as follows. First, McEliece cryptosystems based on punctured RM codes are proposed. It is shown that the already known attacks, such as the Minder-Shokrollahis attack, the Chizhov-Borodins attack, and the square code attack, do not work for the proposed RM code-based McEliece cryptosystems. We find an optimal puncturing scheme to prevent the previously known attacks for the proposed RM code-based cryptosystems in a sense that the exact locations of puncturing positions with the minimum number of punctured columns of the generator matrix should be found for attacking. It is important to carry out the minimum number of puncturing since the modification of codes by puncturing can reduce security level. In addition, the square code attack can also be prevented in the proposed RM code-based McEliece cryptosystems by using both the proposed puncturing and random insertion methods. Second, a new signature scheme based on a punctured Reed-Muller (RM) code with random insertion is proposed. The proposed signature scheme improves the Goppa code-based signature scheme developed by Courtois, Finiasz, and Sendrier (CFS). The CFS signature scheme has certain drawbacks in terms of scaling of the parameters and a lack of existential unforgeability under adaptive chosen message attacks (EUF-CMA) security proof. Further, the proposed modified RM code-based signature scheme can use complete decoding, which can be implemented using a recursive decoding method and thus syndromes for errors larger than the error correctability can be decoded for signing, which improves the probability of successful signing and reduces the signing time. Using the puncturing and insertion methods, the proposed RM code-based signature scheme can avoid some known attacks for RM code-based cryptosystems. The parameters of the proposed signature scheme ...
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: thesis
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf; 2552025 bytes
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: 000000151452; https://hdl.handle.net/10371/140697
– Name: URL
  Label: Availability
  Group: URL
  Data: https://hdl.handle.net/10371/140697
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.F7227C6D
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.F7227C6D
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Code-based cryptosystems
        Type: general
      – SubjectFull: Courtois
        Type: general
      – SubjectFull: Finiasz
        Type: general
      – SubjectFull: and Sendrier (CFS) signature
        Type: general
      – SubjectFull: McEliece cryptosystem
        Type: general
      – SubjectFull: m-sequences
        Type: general
      – SubjectFull: p-ary sequences
        Type: general
      – SubjectFull: post-quantum cryptosystem
        Type: general
      – SubjectFull: public key cryptography
        Type: general
      – SubjectFull: puncturing
        Type: general
      – SubjectFull: Reed-Muller (RM) codes
        Type: general
      – SubjectFull: Weil bound
        Type: general
      – SubjectFull: 621.3
        Type: general
    Titles:
      – TitleFull: RM Code-Based Post Quantum Cryptosystems ; RM부호 기반 포스트 양자 암호시스템
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: 이위직
      – PersonEntity:
          Name:
            NameFull: 노종선
      – PersonEntity:
          Name:
            NameFull: 공과대학 전기·컴퓨터공학부
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2018
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
ResultId 1