首页> 外文会议>International Workshop on Post-Quantum Cryptography >Vulnerabilities of 'McEliece in the World of Escher'
【24h】

Vulnerabilities of 'McEliece in the World of Escher'

机译:“埃克尔世界的MECERIES”的脆弱性

获取原文

摘要

Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern based on "generalized error sets." The general approach was referred to as McEliece in the World of Escher. This paper demonstrates attacks which are significantly cheaper than the claimed security level of the parameters given by Gligoroski et al. We implemented an attack on the proposed 80-bit parameters which was able to recover private keys for both encryption and signatures in approximately 2 hours on a single laptop. We further find that increasing the parameters to avoid our attack will require parameters to grow by (at least) two orders of magnitude for encryption, and may not be achievable at all for signatures.
机译:最近,Gligoroski等。基于代码的加密和签名方案,使用列表解码,群体三角形私钥以及基于“广义错误集”的非均匀误差模式。将一般方法称为eScher世界中的MECERIERE。本文展示了比Gligoroski等人给出的参数的所要求保护的安全级别便宜的攻击。我们对所提出的80位参数实施了攻击,该参数能够在单个笔记本电脑上大约2小时内恢复私钥,用于加密和签名。我们进一步发现,增加参数以避免我们的攻击将需要参数来增长(至少)加密的两个数量级,并且根本可能无法实现签名。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号