Vidéo pédagogique
Notice
Sous-titrage
Anglais
Langue :
Anglais
Crédits
Irene Marquez-Corbella (Intervention), Nicolas Sendrier (Intervention), Matthieu Finiasz (Intervention)
Conditions d'utilisation
Ces ressources de cours sont, sauf mention contraire, diffusées sous Licence Creative Commons. L’utilisateur doit mentionner le nom de l’auteur, il peut exploiter l’œuvre sauf dans un contexte commercial et il ne peut apporter de modifications à l’œuvre originale.
DOI : 10.60527/71a3-5957
Citer cette ressource :
Irene Marquez-Corbella, Nicolas Sendrier, Matthieu Finiasz. Inria. (2015, 5 mai). 2.9. Implementation , in 2: McEliece Cryptosystem. [Vidéo]. Canal-U. https://doi.org/10.60527/71a3-5957. (Consultée le 18 mai 2024)

2.9. Implementation

Réalisation : 5 mai 2015 - Mise en ligne : 20 février 2017
  • document 1 document 2 document 3
  • niveau 1 niveau 2 niveau 3
Descriptif

This is the lastsession of the second week. The cryptography communityhas different options for using public key cryptosystems,among others, they have RSA or DSA. But … McEliece has the same levelof performance of the current protocol? eBATS is a competition toidentify the most efficient public key cryptosystem.They mesure among other criteria: the key size, thetime of the key generation algorithm, the encryptionalgorithm, and the decryption algorithm. The eBATS benchmarking includesseven public key encryption schemes. A McElieceimplementation, from Biswas and Sendrier, using binary Goppa codeswith length of 2048, and the number of errors that itcan correct is 32. The security level of this schemeis around 80 bits of security. An NTRU implementationwith 256-bits of security and five sizes of RSA. eBATS times eachsystem on a wide range of computer. None of thisimplementation have a layer of semantic security. The results seem toconfirm that the McEliece cryptosystem is an interestingcandidate for public key schemes. The fastest encryption inthe eBATS benchmarking is RSA, with 80 bits ofsecurity, followed by the McEliece implementation, whilethe fastest decryption is for NTRU, followed by theMcEliece implementation. Recall that the McEliececryptosystem is well known to provide extremely fast encryptionand reasonnably fast decryption. however, the main drawbackof code-based cryptography are the large key sizes. Aswe have seen, quasi cyclic MDPC codes allow a verycompact key representation. They claim that a public keyof only 4800 bits can provide alevel of 80 bits security. Neither an attack nor animplementation of cryptography using quasi cyclic MDPCcode have been published. We present here recentresults which provide better decryptionperformances for the Mc Eliece. We denote by m the field extension. t, the number oferrors that we can correct.

Intervention

Dans la même collection

Avec les mêmes intervenants et intervenantes

Sur le même thème