TAILIEUCHUNG - Management of confidentiality of cryptosystems using linear codes a bird’s eye view

In this paper, we investigate the management of confidentiality in terms of security notions of McEliece cryptosystem, the first encryption scheme using linear codes, proposed on the basis of the hard problems in coding theory and its variants in the provably secure approach. The original McEliece is only a one way function. Therefore to obtain the higher notions of security, modifications on the original scheme are proposed. | International Journal of Computer Networks and Communications Security C , , JANUARY 2014, 7–14 Available online at: ISSN 2308-9830 N C S Management of Confidentiality of Cryptosystems Using Linear Codes- a Bird’s Eye View Preetha Mathew K1 and Dr Mathew Cherian2 1, 2 Associate Professor, Department of Computer Science and Engineering and Principal, Cochin University College of Engineering Kuttanad, Pulincunnu, Alappuzha, Kerala, India ABSTRACT In this paper, we investigate the management of confidentiality in terms of security notions of McEliece cryptosystem, the first encryption scheme using linear codes, proposed on the basis of the hard problems in coding theory and its variants in the provably secure approach. The original McEliece is only a one way function. Therefore to obtain the higher notions of security, modifications on the original scheme are proposed. Li et al. in IEEE transactions on information theory (1994), proved that the security of McEliece cryptosystem and Niederreiter cryptosystem, the dual of McEliece cryptosystem are equivalent. In this paper we show that it is not true. Dolev et al. in their paper published in STOC (1991), coined the notion of non malleability which formalizes an adversary’s ability to create a different cipher text yı for a plain text xı from the cipher text y which is an encryption of x. It is seen that the McEliece system is malleable and Niederreiter system is non malleable in view of the security notions existing in the provably secure scenario. Keywords: CCA-2 Security, CPA Security, McEliece Cryptosystem, Syndrome Decoding, Code Indistinguishability. 1 INTRODUCTION Confidentiality and authentication are major goals of cryptography. Confidentiality can be obtained using encryption and authentication is obtained by digital signature. One of the basis of the security of encryption is provable security. The security notions widely used in the provably secure approach for the encryption

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.