RM Code-Based Post Quantum Cryptosystems ; RM부호 기반 포스트 양자 암호시스템
Uloženo v:
| Název: | RM Code-Based Post Quantum Cryptosystems ; RM부호 기반 포스트 양자 암호시스템 |
|---|---|
| Autoři: | 이위직 |
| Přispěvatelé: | 노종선, 공과대학 전기·컴퓨터공학부 |
| Informace o vydavateli: | 서울대학교 대학원 |
| Rok vydání: | 2018 |
| Sbírka: | Seoul National University: S-Space |
| Témata: | Code-based cryptosystems, Courtois, Finiasz, and Sendrier (CFS) signature, McEliece cryptosystem, m-sequences, p-ary sequences, post-quantum cryptosystem, public key cryptography, puncturing, Reed-Muller (RM) codes, Weil bound, 621.3 |
| Popis: | 학위논문 (박사)-- 서울대학교 대학원 : 공과대학 전기·컴퓨터공학부, 2018. 2. 노종선. ; In this dissertation, Reed-Muller (RM) code-based cryptosystems and two families of p-ary sequences are considered. Three main contributions are given as follows. First, McEliece cryptosystems based on punctured RM codes are proposed. It is shown that the already known attacks, such as the Minder-Shokrollahis attack, the Chizhov-Borodins attack, and the square code attack, do not work for the proposed RM code-based McEliece cryptosystems. We find an optimal puncturing scheme to prevent the previously known attacks for the proposed RM code-based cryptosystems in a sense that the exact locations of puncturing positions with the minimum number of punctured columns of the generator matrix should be found for attacking. It is important to carry out the minimum number of puncturing since the modification of codes by puncturing can reduce security level. In addition, the square code attack can also be prevented in the proposed RM code-based McEliece cryptosystems by using both the proposed puncturing and random insertion methods. Second, a new signature scheme based on a punctured Reed-Muller (RM) code with random insertion is proposed. The proposed signature scheme improves the Goppa code-based signature scheme developed by Courtois, Finiasz, and Sendrier (CFS). The CFS signature scheme has certain drawbacks in terms of scaling of the parameters and a lack of existential unforgeability under adaptive chosen message attacks (EUF-CMA) security proof. Further, the proposed modified RM code-based signature scheme can use complete decoding, which can be implemented using a recursive decoding method and thus syndromes for errors larger than the error correctability can be decoded for signing, which improves the probability of successful signing and reduces the signing time. Using the puncturing and insertion methods, the proposed RM code-based signature scheme can avoid some known attacks for RM code-based cryptosystems. The parameters of the proposed signature scheme ... |
| Druh dokumentu: | thesis |
| Popis souboru: | application/pdf; 2552025 bytes |
| Jazyk: | English |
| Relation: | 000000151452; https://hdl.handle.net/10371/140697 |
| Dostupnost: | https://hdl.handle.net/10371/140697 |
| Přístupové číslo: | edsbas.F7227C6D |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://hdl.handle.net/10371/140697# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=%EC%9D%B4%EC%9C%84%EC%A7%81 Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.F7227C6D RelevancyScore: 794 AccessLevel: 3 PubType: Dissertation/ Thesis PubTypeId: dissertation PreciseRelevancyScore: 794.436645507813 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: RM Code-Based Post Quantum Cryptosystems ; RM부호 기반 포스트 양자 암호시스템 – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22이위직%22">이위직</searchLink> – Name: Author Label: Contributors Group: Au Data: 노종선<br />공과대학 전기·컴퓨터공학부 – Name: Publisher Label: Publisher Information Group: PubInfo Data: 서울대학교 대학원 – Name: DatePubCY Label: Publication Year Group: Date Data: 2018 – Name: Subset Label: Collection Group: HoldingsInfo Data: Seoul National University: S-Space – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Code-based+cryptosystems%22">Code-based cryptosystems</searchLink><br /><searchLink fieldCode="DE" term="%22Courtois%22">Courtois</searchLink><br /><searchLink fieldCode="DE" term="%22Finiasz%22">Finiasz</searchLink><br /><searchLink fieldCode="DE" term="%22and+Sendrier+%28CFS%29+signature%22">and Sendrier (CFS) signature</searchLink><br /><searchLink fieldCode="DE" term="%22McEliece+cryptosystem%22">McEliece cryptosystem</searchLink><br /><searchLink fieldCode="DE" term="%22m-sequences%22">m-sequences</searchLink><br /><searchLink fieldCode="DE" term="%22p-ary+sequences%22">p-ary sequences</searchLink><br /><searchLink fieldCode="DE" term="%22post-quantum+cryptosystem%22">post-quantum cryptosystem</searchLink><br /><searchLink fieldCode="DE" term="%22public+key+cryptography%22">public key cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22puncturing%22">puncturing</searchLink><br /><searchLink fieldCode="DE" term="%22Reed-Muller+%28RM%29+codes%22">Reed-Muller (RM) codes</searchLink><br /><searchLink fieldCode="DE" term="%22Weil+bound%22">Weil bound</searchLink><br /><searchLink fieldCode="DE" term="%22621%2E3%22">621.3</searchLink> – Name: Abstract Label: Description Group: Ab Data: 학위논문 (박사)-- 서울대학교 대학원 : 공과대학 전기·컴퓨터공학부, 2018. 2. 노종선. ; In this dissertation, Reed-Muller (RM) code-based cryptosystems and two families of p-ary sequences are considered. Three main contributions are given as follows. First, McEliece cryptosystems based on punctured RM codes are proposed. It is shown that the already known attacks, such as the Minder-Shokrollahis attack, the Chizhov-Borodins attack, and the square code attack, do not work for the proposed RM code-based McEliece cryptosystems. We find an optimal puncturing scheme to prevent the previously known attacks for the proposed RM code-based cryptosystems in a sense that the exact locations of puncturing positions with the minimum number of punctured columns of the generator matrix should be found for attacking. It is important to carry out the minimum number of puncturing since the modification of codes by puncturing can reduce security level. In addition, the square code attack can also be prevented in the proposed RM code-based McEliece cryptosystems by using both the proposed puncturing and random insertion methods. Second, a new signature scheme based on a punctured Reed-Muller (RM) code with random insertion is proposed. The proposed signature scheme improves the Goppa code-based signature scheme developed by Courtois, Finiasz, and Sendrier (CFS). The CFS signature scheme has certain drawbacks in terms of scaling of the parameters and a lack of existential unforgeability under adaptive chosen message attacks (EUF-CMA) security proof. Further, the proposed modified RM code-based signature scheme can use complete decoding, which can be implemented using a recursive decoding method and thus syndromes for errors larger than the error correctability can be decoded for signing, which improves the probability of successful signing and reduces the signing time. Using the puncturing and insertion methods, the proposed RM code-based signature scheme can avoid some known attacks for RM code-based cryptosystems. The parameters of the proposed signature scheme ... – Name: TypeDocument Label: Document Type Group: TypDoc Data: thesis – Name: Format Label: File Description Group: SrcInfo Data: application/pdf; 2552025 bytes – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: 000000151452; https://hdl.handle.net/10371/140697 – Name: URL Label: Availability Group: URL Data: https://hdl.handle.net/10371/140697 – Name: AN Label: Accession Number Group: ID Data: edsbas.F7227C6D |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.F7227C6D |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: English Subjects: – SubjectFull: Code-based cryptosystems Type: general – SubjectFull: Courtois Type: general – SubjectFull: Finiasz Type: general – SubjectFull: and Sendrier (CFS) signature Type: general – SubjectFull: McEliece cryptosystem Type: general – SubjectFull: m-sequences Type: general – SubjectFull: p-ary sequences Type: general – SubjectFull: post-quantum cryptosystem Type: general – SubjectFull: public key cryptography Type: general – SubjectFull: puncturing Type: general – SubjectFull: Reed-Muller (RM) codes Type: general – SubjectFull: Weil bound Type: general – SubjectFull: 621.3 Type: general Titles: – TitleFull: RM Code-Based Post Quantum Cryptosystems ; RM부호 기반 포스트 양자 암호시스템 Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: 이위직 – PersonEntity: Name: NameFull: 노종선 – PersonEntity: Name: NameFull: 공과대학 전기·컴퓨터공학부 IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2018 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa |
| ResultId | 1 |
Nájsť tento článok vo Web of Science