Vidéo pédagogique
Notice
Sous-titrage
Anglais
Langue :
Anglais
Crédits
Irene Marquez-Corbella (Intervention), Nicolas Sendrier (Intervention), Matthieu Finiasz (Intervention)
Conditions d'utilisation
Ces ressources de cours sont, sauf mention contraire, diffusées sous Licence Creative Commons. L’utilisateur doit mentionner le nom de l’auteur, il peut exploiter l’œuvre sauf dans un contexte commercial et il ne peut apporter de modifications à l’œuvre originale.
DOI : 10.60527/6at0-r315
Citer cette ressource :
Irene Marquez-Corbella, Nicolas Sendrier, Matthieu Finiasz. Inria. (2015, 5 mai). 1.9. McEliece Cryptosystem , in 1: Error-Correcting Codes and Cryptography. [Vidéo]. Canal-U. https://doi.org/10.60527/6at0-r315. (Consultée le 2 juin 2024)

1.9. McEliece Cryptosystem

Réalisation : 5 mai 2015 - Mise en ligne : 20 février 2017
  • document 1 document 2 document 3
  • niveau 1 niveau 2 niveau 3
Descriptif

This is the last session ofthe first week of this MOOC. We have already all the ingredientsto talk about code-based cryptography. Recall that in 1976 Diffieand Hellman published their famous paper "New Directionsin Cryptography", where they introduced public keycryptography providing a solution to the problem of key exchange. Mathematically speaking,public key cryptography considers the notion ofone-way trapdoor function that is easy in one direction,hard in the reverse direction unless you have a specialinformation called the trapdoor. The security of the mostpopular public key cryptosystems is based either on thehardness of factoring or the presumed intractability ofthe discrete log problem. Code-based cryptography is based onthe following one-way trapdoor function. It is easy and fast toencode a message using linear transformations since it can beviewed as a matrix multiplication. It is hard to decoderandom linear code.  Recall that the generaldecoding problem was proven to be NP-complete in the late 1970s. And the trapdoorinformation is that there exists some families of codes that haveefficient decoding algorithms. We have seen thegeneralized Reed-Solomon codes and the Goppa codes.McEliece presented, in 1978, the first public key cryptosystembased on error-correcting codes. The security of this schemeis based on two intractable problems: the hardness ofdecoding, or equivalently the problem of finding codewordsof minimal support, and the problem of distinguishinga code with a prescribed structure from a random one.

Intervention

Dans la même collection

Avec les mêmes intervenants et intervenantes

Sur le même thème