Top Qs
Timeline
Chat
Perspective
Niederreiter cryptosystem
From Wikipedia, the free encyclopedia
Remove ads
In cryptography, the Niederreiter cryptosystem is a variation of the McEliece cryptosystem developed in 1986 by Harald Niederreiter.[1] It applies the same idea to the parity check matrix, H, of a linear code. Niederreiter is equivalent to McEliece from a security point of view. It uses a syndrome as ciphertext and the message is an error pattern. The encryption of Niederreiter is about ten times faster than the encryption of McEliece. Niederreiter can be used to construct a digital signature scheme.
![]() | This article includes a list of general references, but it lacks sufficient corresponding inline citations. (April 2009) |
Remove ads
Scheme definition
A special case of Niederreiter's original proposal was broken[2] but the system is secure when used with a Binary Goppa code.
Key generation
- Alice selects a binary (n, k)-linear Goppa code, G, capable of correcting t errors. This code possesses an efficient decoding algorithm.
- Alice generates a (n − k) × n parity check matrix, H, for the code, G.
- Alice selects a random (n − k) × (n − k) binary non-singular matrix, S.
- Alice selects a random n × n permutation matrix, P.
- Alice computes the (n − k) × n matrix, Hpub = SHP.
- Alice's public key is (Hpub, t); her private key is (S, H, P).
Message encryption
Suppose Bob wishes to send a message, m, to Alice whose public key is (Hpub, t):
- Bob encodes the message, m, as a binary string em' of length n and weight at most t.
- Bob computes the ciphertext as c = HpubeT.
Message decryption
Upon receipt of c = HpubmT from Bob, Alice does the following to retrieve the message, m.
- Alice computes S−1c = HPmT.
- Alice applies a syndrome decoding algorithm for G to recover PmT.
- Alice computes the message, m, via mT = P−1PmT.
Remove ads
Signature scheme
Summarize
Perspective
Courtois, Finiasz and Sendrier showed how the Niederreiter cryptosystem can be used to derive a signature scheme .[3][4]
- Calculate , where is a Hash Function and is the signed document.
- Calculate , where denotes concatenation.
- Attempt to decrypt until the smallest value of (denoted further as ) for which is decryptable is found.
- Use the trapdoor function to compute such that , where is the public key.
- Compute the index of in the space of words of weight 9.
- Use as the signature.
The Verification algorithm is much simpler:
- Recover from index .
- Compute with the public key .
- Compute .
- Compare and . If they are the same the signature is valid.
The index of can be derived using the formula below, where denote the positions of non-zero bits of .The number of bits necessary to store is not reducible. On average it will be bits long. Combined with the average bits necessary to store , the signaure will on average be bits long.
Remove ads
References
External links
Wikiwand - on
Seamless Wikipedia browsing. On steroids.
Remove ads