Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - On improving security of GPT cryptosystems
AU - Rashwan, Haitham
AU - Honary, Bahram
AU - Gabidulin, E. M.
PY - 2009/6
Y1 - 2009/6
N2 - The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were published, including Gibson's attacks and more recently Overbeck's attacks. A few modifications were proposed withstanding Gibson's attack but at least one of them was broken by the stronger attacks by Overbeck. A tool to prevent Overbeck's attack is presented in. In this paper, we apply this approach to other variants of the GPT cryptosystem.
AB - The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were published, including Gibson's attacks and more recently Overbeck's attacks. A few modifications were proposed withstanding Gibson's attack but at least one of them was broken by the stronger attacks by Overbeck. A tool to prevent Overbeck's attack is presented in. In this paper, we apply this approach to other variants of the GPT cryptosystem.
U2 - 10.1109/ISIT.2009.5206029
DO - 10.1109/ISIT.2009.5206029
M3 - Conference contribution/Paper
SN - 978-1-4244-4312-3
SP - 1110
EP - 1114
BT - Information Theory, 2009. ISIT 2009. IEEE International Symposium on
PB - IEEE
CY - Seoul, Korea
ER -