Abstract
Recently J. and R.M. Campello de Souza proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we show that J. and R.M. Campello de Souza's scheme is insecure against chosen-plaintext attacks, and consequently propose a secure modified scheme.
This work was supported in part by the National Science Council, Taiwan, under contract NSC-87-2213-E-324-003.
Preview
Unable to display preview. Download preview PDF.
References
McEliece, R.J., “A Public-Key Cryptosystem Based on Algebraic Coding Theory,” DSN Progress Report, 42–44 (1978) 114–116
Rivest, R.L., Shamir, A., and Adleman, L.M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM21 (2) (1978) 120–126
ElGamal, T., “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. IT-31 (4) (1985) 469–472
Korzhik, V.I., and Türkin, A.I., “Cryptanalysis of McEliece's Public-Key Cryptosystem”, Advances in Cryptology-EUROCRYPT'91, Lecture Notes in Computer Science, Springer-Verlag (1991) 68–70
Berson, T.A., “Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack,” Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science, Vol. 1294. Springer-Verlag (1997) 213–220
Rao, T.R.N., and Nam, K.H., “Private-Key Algebraic-Coded Cryptosystems,” Advances in Cryptology-CRYPTO'86, Lecture Notes in Computer Science, Springer-Verlag (1987) 35–48
Rao, T.R.N., and Nam, K.H., “Private-Key Algebraic-Code Encryption,” IEEE Trans., IT-35 (4) (1987) 829–833
Hin, P.J.M., “Channel-Error-Correcting Privacy Cryptosystems,” Ph.D. Dissertation (in Dutch), Delft University of Technology (1986)
Struik, R., and Tilburg, J., “The Rao-Nam Scheme Is Insecure Against a Chosen-Plaintext Attack,” Advances in Cryptology-CRYPTO'87, Lecture Notes in Computer Science, Springer-Verlag (1988) 445–457
Brickell, E.F., and Odlyzko, A., “Cryptanalysis: A Survey of Recent Results,” Proc. IEEE 76 (5) (1988) 153–165
Denny, W.F., “Encryptions Using Linear and Non-Linear Codes: Implementation and Security Considerations,” Ph.D. Dissertation, The Center for Advanced Computer Studies,University of Southwestern Louisiana, Lafayette (1988)
Struik, R., “On the Rao-Nam Scheme Using Nonlinear Codes,” in Proc. of the 1991 IEEE Int. Symp. Information Theory (1991) 174
Alencar, F.M.R., Léo, A.M.P., and Campello de Souza, R.M., “Private-Key Burst Correcting Code Encryption,” in Proc. of the 1993 IEEE Int. Symp. Information Theory (1993) 227
Campello de Souza, R.M., and Campello de Souza, J., “Array Codes for Private-Key Encryption,” Electronics Letters 30 (17) (1994) 1394–1396
Sun, H.M., and Shieh, S.P., “Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes,” Proc. Third ACM Conference on Computer and Communications Security (1996) 153–156
A1 Jabri, A., “Security of Private-Key Encryption Based on Array Codes”, Electronics Letters 32 (24) (1996) 2226–2227
Campello de Souza, J., and Campello de Souza, R.M., “Product Codes and Private-Key Encryption,” in Proc. of the 1995 IEEE Int. Symp. Information Theory (1995) 489
Ross, S., A First Course in Probability, Prentice-Hall (1994)
Hwang, T., and Rao, T.R.N., “On the Generation of Large (s, s−1) Pairs and Permutation Matrices over the Binary Field,” Tech. Rep. Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette (1986)
Sun, H.M., and Hwang, T., “Key Generation of Algebraic-Code Cryptosystems”, Computers and Mathematics with Applications 27 (2) (1994) 99–106
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sun, H.M., Shieh, S.P. (1998). On private-key cryptosystems based on product codes. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053722
Download citation
DOI: https://doi.org/10.1007/BFb0053722
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64732-4
Online ISBN: 978-3-540-69101-3
eBook Packages: Springer Book Archive