cours / présentation

4.1. Introduction

Welcome to the fourth week of the MOOC Code-based Cryptography. Recall that we have mainly two ways of cryptanalyzing in the McEliece cryptosystem. We have Message Attacks, which address the problem of decoding a random linear code; these attacks has already been studied in the third week, by Nicola...

Date de création :

05.05.2015

Auteur(s) :

Irene MARQUEZ-CORBELLA, Nicolas SENDRIER, Matthieu FINIASZ

Présentation

Informations pratiques

Langue du document : Anglais
Type : cours / présentation
Niveau : master, doctorat
Durée d'exécution : 4 minutes 47 secondes
Contenu : vidéo
Document : video/mp4
Poids : 123.39 Mo
Droits d'auteur : libre de droits, gratuit
Droits réservés à l'éditeur et aux auteurs. Ces ressources de cours sont, sauf mention contraire, diffusées sous Licence Creative Commons. L’utilisateur doit mentionner le nom de l’auteur, il peut exploiter l’œuvre sauf dans un contexte commercial et il ne peut apporter de modifications à l’œuvre originale.

Description de la ressource

Résumé

Welcome to the fourth week of the MOOC Code-based Cryptography. Recall that we have mainly two ways of cryptanalyzing in the McEliece cryptosystem. We have Message Attacks, which address the problem of decoding a random linear code; these attacks has already been studied in the third week, by Nicolas Sendrier. Notice that efficient generic attack just makes the use of larger code in the McEliece scheme necessary. And we also have Key Attacks. These attacks try to retrieve the code structure, rather than attempting to use an specific decoding algorithm. These attacks will be studied during this week. First, let us give a small introduction. The principle of the McEliece cryptosystem is as follows: consider a large family of codes, with an efficient decoding algorithm, which is indistinguishable from a random family of linear codes of the same length and dimension. Then, the public key is a generator matrix of a code of the chosen family and the number of errors that we can correct. And the secret key is an efficient decoding algorithm specific for such code. The encryption algorithm: we take a plaintext and the public key, and we generate an error-vector of weight at most t, which is the error-correcting capacity. We encode the message using the public key, then, the ciphertext is just the resulting codeword, and the error. How to decrypt? We just apply the secret key that is an efficient decoding algorithm, to retrieve the original message. McEliece proposed to use binary Goppa code, but the parameters that he proposed are not enough nowadays. But there exist other families suitable for the McEliece scheme? On the following slides, we give a summary of these different proposals.

"Domaine(s)" et indice(s) Dewey

  • Analyse numérique (518)
  • Théorie de l'information (003.54)
  • données dans les systèmes informatiques (005.7)
  • cryptographie (652.8)
  • Mathématiques (510)

Domaine(s)

  • Analyse numérique
  • Analyse numérique appliquée, calcul numérique, mathématiques numériques
  • Programmation : Algorithmique, langages, conception objet, programmes
  • Informatique
  • Informatique
  • Expression orale et écrite
  • Cryptographie
  • Généralités, philosophie, théorie des mathématiques
  • Généralités
  • Outils, méthodes et techniques scientifiques
  • Didactique des mathématiques
  • Histoire des mathématiques
  • Mathématiques et physique

Document(s) annexe(s)

Fiche technique

Identifiant de la fiche : 32923
Identifiant OAI-PMH : oai:canal-u.fr:32923
Schéma de la métadonnée : oai:uved:Cemagref-Marine-Protected-Areas
Entrepôt d'origine : Canal-U

Voir aussi

Canal-U
Canal-U
05.05.2015
Description : All the results that we have seen this week doesn't mean that code based cryptography is broken. So in this session we will see that Goppa code still resists to all these attacks. So recall that it is assumed that Goppa codes are pseudorandom, that is there exist no efficient distinguisher for ...
  • algèbre linéaire
  • chiffrement à clé publique
  • cryptage des données
  • cryptographie
  • code correcteur
  • algorithmes
  • GRS code
Canal-U
Canal-U
05.05.2015
Description : In this session, we will present an attack against Algebraic Geometry codes (AG codes). Algebraic Geometry codes is determined by a triple. First of all, an algebraic curve of genus g, then a n-tuple of rational points and then a divisor which has disjoint support from the n-tuple P. Then, the A ...
  • algèbre linéaire
  • chiffrement à clé publique
  • cryptage des données
  • cryptographie
  • code correcteur
  • algorithmes
  • GRS code