Vidéo pédagogique
Notice
Sous-titrage
Anglais
Langue :
Anglais
Crédits
Irene Marquez-Corbella (Intervention), Nicolas Sendrier (Intervention), Matthieu Finiasz (Intervention)
Conditions d'utilisation
Ces ressources de cours sont, sauf mention contraire, diffusées sous Licence Creative Commons. L’utilisateur doit mentionner le nom de l’auteur, il peut exploiter l’œuvre sauf dans un contexte commercial et il ne peut apporter de modifications à l’œuvre originale.
DOI : 10.60527/7szm-4x78
Citer cette ressource :
Irene Marquez-Corbella, Nicolas Sendrier, Matthieu Finiasz. Inria. (2015, 5 mai). 2.6. Reducing the Key Size , in 2: McEliece Cryptosystem. [Vidéo]. Canal-U. https://doi.org/10.60527/7szm-4x78. (Consultée le 16 mai 2024)

2.6. Reducing the Key Size

Réalisation : 5 mai 2015 - Mise en ligne : 20 février 2017
  • document 1 document 2 document 3
  • niveau 1 niveau 2 niveau 3
Descriptif

In the next three sessions,I will explain how to reduce the key size ofcode-based cryptosystem. Circulant matrices are thecentral point in many attempts to reduce the key size ofcode-based cryptosystems since they provideefficient representation. A circulant matrix isa square matrix, its rows are obtained bycyclically shifting the first row. An alternative representation of ann-tuple of elements is using polynomial. Thus, this matrix can bedescribed by a polynomial. And the i-th row of acirculant matrix can be expressed by this formula. Circulantmatrices are closed under product and sum. Thus, this operationpreserves cyclicity. So, we have thefollowing proposition. Circulant matrices of sizer, with elements in Fq are equivalent topolynomials in this quotient ring.Block-Circulant matricesare formed by concatenating circulant blocks of identical size. Quasi-cyclic codes havebeen defined as a linear code that admits a block-circulant matrix. We will considerquasi-cyclic codes that can be written in block-circulant systematic form. Quasi-cyclic subcodes of BCH codeswere proposed by Gaborit in 2005. Take notice that these codescan be efficiently decoded. Thus, there are suitablefamilies for code-based cryptosystem. This table presents theparameters suggested by the author. Note that the key size forthe same level of security drops considerably compared tothe original scheme with Goppa code.  The minimum size forGoppa code is around 700 000  bits for 80 bits ofsecurity while with this security level with quasi-cyclicsubcode of BCH code, we just need 12 000 bits.

Intervention

Dans la même collection

Avec les mêmes intervenants et intervenantes

Sur le même thème