Skip to main content

A correlation cryptographic scheme

  • Section 4 Protection Of Information
  • Conference paper
  • First Online:
EUROCODE '90 (EUROCODE 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 514))

Abstract

In [1] McEliece introduced a public key cryptosystem using error correcting codes. The message is coded into codewords by using a public generator matrix G. The key to the system is an error vector of weight smaller than the error capacity which is added to the coded information vector. Polynomial time attacks have been devised against this scheme.

In this work we introduce a secret key coding scheme which relies on a subset S of a particular set of random codes of known minimum distance and for which a decoding algorithm is known. The cryptogram vector is this case too made of the sum of a codeword and a noise vector. However, the vector containing information is the “noise” vector and the masking vector is the “codeword”. The code itself is randomly chosen at each message in the corresponding set.

The robustness of the system is studied and, in particular, the attacks on the McEliece scheme [2] do not hold in this scheme, as well as the attacks that succeed when the set of codes is reduced to exactly one code.

This cryptosystem has the property that, if a set of matrices can be put in a tamper proof environment, then a user does not need to know any secret information to operate the system.

A conventional public key version of the cryptosystem, which needs more on line redundancy to achieve the same level of secrecy, will be given in a forthcoming paper.

As it is the case for the McEliece cryptosystem the new system introduces redundancy. These redundancy requirements are also studied.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

8. Bibliography

  1. R.J. McEliece “A public key cryptosytem based on algebraic coding theory” CA May 1978

    Google Scholar 

  2. E.R. Berlekamp “On the inherent intractability of certain coding problems” IEEE Trans. on Info. Theory Vol. IT-22, pp. 644–654, May 1978.

    Google Scholar 

  3. P.J. Lee and E.F. Brickell “An observation on the security of McEliece's Public Key Cryptosystem” Eurocrypt 1988 Davos Switzerland pp.153–157, May 1988.

    Google Scholar 

  4. C.M.Adams and H. Meijer, “Security related comments regarding McEliece's public-key cryptosystem” to appear Proc.Crypto '87 Aug. 87.

    Google Scholar 

  5. J.Stern, “Private Conversation” Eurocode 90 Udine Italy Nov 1990.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gérard Cohen Pascale Charpin

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Harari, S. (1991). A correlation cryptographic scheme. In: Cohen, G., Charpin, P. (eds) EUROCODE '90. EUROCODE 1990. Lecture Notes in Computer Science, vol 514. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-54303-1_130

Download citation

  • DOI: https://doi.org/10.1007/3-540-54303-1_130

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-54303-9

  • Online ISBN: 978-3-540-47546-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics