Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes

Autor: Jean Belo Klamti, Thierry P. Berger, Cheikh Thiecoumba Gueye, Olivier Ruatta
Přispěvatelé: Laboratoire de Thermique, Ecoulements Mécaniques matériaux mise en forme PrOduction (TEMPO), Université de Valenciennes et du Hainaut-Cambrésis (UVHC), Université Cheikh Anta Diop [Dakar, Sénégal] (UCAD), Mathématiques & Sécurité de l'information (XLIM-MATHIS), XLIM (XLIM), Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)
Jazyk: angličtina
Rok vydání: 2019
Předmět:
[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]
Cyclic subspace
Theoretical computer science
Computer science
business.industry
[MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
020206 networking & telecommunications
0102 computer and information sciences
02 engineering and technology
Coding theory
01 natural sciences
Public-key cryptography
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
010201 computation theory & mathematics
Reed–Solomon error correction
[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]
[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]
0202 electrical engineering
electronic engineering
information engineering

Code (cryptography)
Cryptosystem
Hardware_ARITHMETICANDLOGICSTRUCTURES
business
Subspace topology
ComputingMilieux_MISCELLANEOUS
Key size
Zdroj: Algebra, Codes and Cryptology
Algebra, Codes and Cryptology, pp.97-113, 2019, ⟨10.1007/978-3-030-36237-9_6⟩
Algebra, Codes and Cryptology ISBN: 9783030362362
DOI: 10.1007/978-3-030-36237-9_6⟩
Popis: In this paper we introduce a code-based cryptosystem using quasi-cyclic generalized subspace subcodes of Generalized Reed-Solomon codes in order to reduce the public key size. In our scheme the underlying Generalized Reed-Solomon code is not secret, so the classical attacks such as square code or folding attacks have no more purpose against it. In addition one part of the security of this scheme is based on hard problems in coding theory like Equivalence Subcodes (ES) Problem. We propose some parameters to reach at least a security level of 128 and 192 bits. We make a public key size comparison with some well established code-based public key encryption schemes. We also see that for the 128 bits security level the key size of our proposals are often better than the code-based schemes in competition for NIST’s second round.
Databáze: OpenAIRE