Effective implementation of modern McEliece cryptosystem on generalized (L,G)-codes
Subject of Research. The paper presents the study of methods and approaches to implementation of the modern McEliece cryptosystem based on separable generalized (L, G)-codes. Method. A method is proposed based on the analysis of the well-known public sources on implementation of the modern McEliece...
Uložené v:
| Vydané v: | Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki Ročník 20; číslo 4; s. 539 - 544 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
ITMO University
01.08.2020
|
| Predmet: | |
| ISSN: | 2226-1494, 2500-0373 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Shrnutí: | Subject of Research. The paper presents the study of methods and approaches to implementation of the modern McEliece cryptosystem based on separable generalized (L, G)-codes. Method. A method is proposed based on the analysis of the well-known public sources on implementation of the modern McEliece cryptosystem that uses the generalized (L, G)-codes with locators of degree greater than or equal to the second one without using an extended field. Mаin Results. Approaches to implementation of the modern McEliece cryptosystem based on the generalized (L, G)-codes are developed, namely: creation of a parity check matrix for the generalized (L, G)-code using a separable Goppa polynomial and locators of various degrees, description of an approach to the implementation of encryption and decryption of messages in the modern McEliece cryptosystem, presentation of the Chein’s procedure for numerators of degree greater than or equal to the second one without expanding the field. Practical Relevance. The proposed methods can be used in the development of cryptographic systems that can withstand attacks from quantum computers and ensure data confidentiality, as well as improve the security and performance of cryptosystems. Aerospace, automobile, railway, network multimedia, telecommunication and mobile information protection systems can also be the scope of the work results. |
|---|---|
| ISSN: | 2226-1494 2500-0373 |
| DOI: | 10.17586/2226-1494-2020-20-4-539-544 |