首页> 外文会议>International workshop on post-quantum cryptography >Vulnerabilities of 'McEliece in the World of Escher'
【24h】

Vulnerabilities of 'McEliece in the World of Escher'

机译:“埃舍尔世界中的McEliece”的漏洞

获取原文

摘要

Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern based on "generalized error sets." The general approach was referred to as McEliece in the World of Escher. This paper demonstrates attacks which are significantly cheaper than the claimed security level of the parameters given by Gligoroski et al. We implemented an attack on the proposed 80-bit parameters which was able to recover private keys for both encryption and signatures in approximately 2 hours on a single laptop. We further find that increasing the parameters to avoid our attack will require parameters to grow by (at least) two orders of magnitude for encryption, and may not be achievable at all for signatures.
机译:最近,Gligoroski等。提出了一种基于代码的加密和签名方案,该方案使用列表解码,逐块三角私钥和基于“广义错误集”的非均匀错误模式。通用方法在《埃舍尔世界》中被称为McEliece。本文演示了比Gligoroski等人给出的参数所要求的安全级别便宜得多的攻击。我们对建议的80位参数进行了攻击,该参数能够在一台笔记本电脑上大约2小时内恢复加密和签名的私钥。我们进一步发现,增加参数以避免我们的攻击将要求参数(至少)增长两个数量级(对于加密),而对于签名而言可能根本无法实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号