Vidéo pédagogique
Notice
Sous-titrage
Anglais
Langue :
Anglais
Crédits
Irene Marquez-Corbella (Intervention), Nicolas Sendrier (Intervention), Matthieu Finiasz (Intervention)
Conditions d'utilisation
Ces ressources de cours sont, sauf mention contraire, diffusées sous Licence Creative Commons. L’utilisateur doit mentionner le nom de l’auteur, il peut exploiter l’œuvre sauf dans un contexte commercial et il ne peut apporter de modifications à l’œuvre originale.
DOI : 10.60527/g4yn-jy14
Citer cette ressource :
Irene Marquez-Corbella, Nicolas Sendrier, Matthieu Finiasz. Inria. (2015, 5 mai). 2.4. Notions of Security , in 2: McEliece Cryptosystem. [Vidéo]. Canal-U. https://doi.org/10.60527/g4yn-jy14. (Consultée le 18 mai 2024)

2.4. Notions of Security

Réalisation : 5 mai 2015 - Mise en ligne : 20 février 2017
  • document 1 document 2 document 3
  • niveau 1 niveau 2 niveau 3
Descriptif

In this session, we will study thenotion of security of public-key scheme. A public-key scheme isone-way if the probability of success of any adversaryrunning in polynomial time is negligible. That is,without the private key, it is computationally impossibleto recover the plaintext. For the McEliece, if weassume that the general decoding problem of a linear codeis on average a difficult problem and there exists noefficient distinguisher for Goppa codes, then the McEliecescheme has the One-Wayness property. However, McEliece isvulnerable to many attacks as we will see in the followingslides, and also in the next session. In this session, we will usethe notion of Oracle, along the following slides. An Oracle is simply a system thattakes queries and provides answers. The queries might beplaintext or ciphertext and the answers are thecorresponding ciphertext or plaintext. Non-malleabilityguarantees that it is infeasible to modify the ciphertext intoanother ciphertext of related messages. The following attack tellsus that the McEliece does not satisfy non-malleability.Suppose that the adversary intercepts a ciphertext.That is, the ciphertext is the sum of an encodedmessage and a random error. Then, the adversary canchoose a codeword and generate a new ciphertext withoutknowing the original plaintext. And there exists a relationbetween the first plaintext and the new plaintext.Now, suppose that the adversary has accessto a decryption Oracle.

Intervention

Dans la même collection

Avec les mêmes intervenants et intervenantes

Sur le même thème