Selecting parameters for secure McEliece-based cryptosystems


Authors / Editors


Research Areas

No matching items found.


Publication Details

Output typeJournal article

Author listNiebuhr R, Meziani M, Bulygin S, Buchmann J

PublisherSpringer

Publication year2012

JournalInternational Journal of Information Security (1615-5262)

Volume number11

Issue number3

Start page137

End page147

Number of pages11

ISSN1615-5262

eISSN1615-5270

LanguagesEnglish-Great Britain (EN-GB)


Unpaywall Data

Open access statusgreen

Full text URLhttp://eprint.iacr.org/2010/271.pdf


Abstract

In 1994, Shor showed that quantum computers will be able to break cryptosystems based on the problems of integer factorization and the discrete logarithm, for example, RSA or ECC. Code-based cryptosystems are promising alternatives to public-key schemes built on these problems, and they are believed to be secure against quantum computer attacks. In this paper, we solve the problem of selecting optimal parameters for the McEliece cryptosystem that are expected to provide security at least until a given year and give detailed recommendations. Our analysis is based on the lower bound complexity estimates by Sendrier and Finiasz, and the security requirements model proposed by Lenstra and Verheul. This security model uses assumptions about Moore's Law and other developments in order to estimate the attained security level for a given year.


Keywords

CodesKey lengthMcElieceMoore's LawParametersPost-quantum cryptography


Documents

No matching items found.


Last updated on 2025-17-07 at 03:01