Journal of Computational and Engineering Mathematics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



J. Comp. Eng. Math.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Journal of Computational and Engineering Mathematics, 2018, Volume 5, Issue 2, Pages 16–33
DOI: https://doi.org/10.14529/jcem180202
(Mi jcem116)
 

This article is cited in 3 scientific papers (total in 3 papers)

Computational Mathematics

On the Berger–Loidreau cryptosystem on the tensor product of codes

V. M. Deundyakab, Yu. V. Kosolapova

a Southern Federal University (Rostov-on-Don, Russian Federation)
b FGNU NII "Specvuzavtomatika" (Rostov-on-Don, Russian Federation)
Full-text PDF (186 kB) Citations (3)
References:
Abstract: In the post-quantum era, asymmetric cryptosystems based on linear codes (code cryptosystems) are considered as an alternative to modern asymmetric cryptosystems. However, the research of the strength of code McEliece-type cryptosystems shows that algebraically structured codes do not provide sufficient strength of these cryptosystems. On the other hand, the use of random codes in such cryptosystems is impossible because of the high complexity of its decoding. Strengthening of code cryptosystems is currently conducted, usually, either by using codes for which no attacks are known, or by modifying the cryptographic protocol. In this paper both of these approaches are used. On the one hand, it is proposed to use the tensor product $C^1\otimes C^2$ of the known codes $C^1$ and $C^2$, since for $C^1\otimes C^2$ in some cases it is possible to construct an effective decoding algorithm. On the other hand, instead of a McEliece-type cryptosystem, it is proposed to use its modification, a Berger–Loidreau cryptosystem. The paper proves a high strength of the constructed code cryptosystem to attacks on the key even in the case when code cryptosystems on codes $C^1$ and $C^2$ are cracked.
Keywords: the Berger–Loidreau cryptosystem, the tensor product of codes, the attack on the key.
Received: 25.05.2018
Bibliographic databases:
Document Type: Article
UDC: 517.9
MSC: 39A60
Language: English
Citation: V. M. Deundyak, Yu. V. Kosolapov, “On the Berger–Loidreau cryptosystem on the tensor product of codes”, J. Comp. Eng. Math., 5:2 (2018), 16–33
Citation in format AMSBIB
\Bibitem{DeuKos18}
\by V.~M.~Deundyak, Yu.~V.~Kosolapov
\paper On the Berger--Loidreau cryptosystem on the tensor product of codes
\jour J. Comp. Eng. Math.
\yr 2018
\vol 5
\issue 2
\pages 16--33
\mathnet{http://mi.mathnet.ru/jcem116}
\crossref{https://doi.org/10.14529/jcem180202}
\mathscinet{http://mathscinet.ams.org/mathscinet-getitem?mr=3817477}
\elib{https://elibrary.ru/item.asp?id=35221212}
Linking options:
  • https://www.mathnet.ru/eng/jcem116
  • https://www.mathnet.ru/eng/jcem/v5/i2/p16
  • This publication is cited in the following 3 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Journal of Computational and Engineering Mathematics
    Statistics & downloads:
    Abstract page:512
    Full-text PDF :173
    References:36
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024