cours / présentation

2.6. Reducing the Key Size

In the next three sessions, I will explain how to reduce the key size of code-based cryptosystem. Circulant matrices are the central point in many attempts to reduce the key size of code-based cryptosystems since they provide efficient representation. A circulant matrix is a square matrix, its rows ...

Date de création :

05.05.2015

Auteur(s) :

Irene MARQUEZ-CORBELLA, Nicolas SENDRIER, Matthieu FINIASZ

Présentation

Informations pratiques

Langue du document : Anglais
Type : cours / présentation
Niveau : master, doctorat
Durée d'exécution : 3 minutes 45 secondes
Contenu : vidéo
Document : video/mp4
Poids : 98.64 Mo
Droits d'auteur : libre de droits, gratuit
Droits réservés à l'éditeur et aux auteurs. Ces ressources de cours sont, sauf mention contraire, diffusées sous Licence Creative Commons. L’utilisateur doit mentionner le nom de l’auteur, il peut exploiter l’œuvre sauf dans un contexte commercial et il ne peut apporter de modifications à l’œuvre originale.

Description de la ressource

Résumé

In the next three sessions, I will explain how to reduce the key size of code-based cryptosystem. Circulant matrices are the central point in many attempts to reduce the key size of code-based cryptosystems since they provide efficient representation. A circulant matrix is a square matrix, its rows are obtained by cyclically shifting the first row. An alternative representation of an n-tuple of elements is using polynomial. Thus, this matrix can be described by a polynomial. And the i-th row of a circulant matrix can be expressed by this formula. Circulant matrices are closed under product and sum. Thus, this operation preserves cyclicity. So, we have the following proposition. Circulant matrices of size r, with elements in Fq are equivalent to polynomials in this quotient ring. Block-Circulant matrices are formed by concatenating circulant blocks of identical size. Quasi-cyclic codes have been defined as a linear code that admits a block-circulant matrix.  We will consider quasi-cyclic codes that can be written in block-circulant systematic form. Quasi-cyclic subcodes of BCH codes were proposed by Gaborit in 2005. Take notice that these codes can be efficiently decoded. Thus, there are suitable families for code-based cryptosystem. This table presents the parameters suggested by the author. Note that the key size for the same level of security drops considerably compared to the original scheme with Goppa code.  The minimum size for Goppa code is around 700 000  bits for 80 bits of security while with this security level with quasi-cyclic subcode of BCH code, we just need 12 000 bits.

"Domaine(s)" et indice(s) Dewey

  • Analyse numérique (518)
  • Théorie de l'information (003.54)
  • données dans les systèmes informatiques (005.7)
  • cryptographie (652.8)
  • Mathématiques (510)

Domaine(s)

  • Analyse numérique
  • Analyse numérique appliquée, calcul numérique, mathématiques numériques
  • Programmation : Algorithmique, langages, conception objet, programmes
  • Informatique
  • Informatique
  • Expression orale et écrite
  • Cryptographie
  • Généralités, philosophie, théorie des mathématiques
  • Généralités
  • Outils, méthodes et techniques scientifiques
  • Didactique des mathématiques
  • Histoire des mathématiques
  • Mathématiques et physique

Document(s) annexe(s)

Fiche technique

Identifiant de la fiche : 32845
Identifiant OAI-PMH : oai:canal-u.fr:32845
Schéma de la métadonnée : oai:uved:Cemagref-Marine-Protected-Areas
Entrepôt d'origine : Canal-U

Voir aussi

Canal-U
Canal-U
05.05.2015
Description : This is the last session of the second week. The cryptography community has different options for using public key cryptosystems, among others, they have RSA or DSA. But … McEliece has the same level of performance of the current protocol? eBATS is a competition to identify the most efficient public ...
  • algèbre linéaire
  • chiffrement à clé publique
  • cryptage des données
  • cryptographie
  • McEliece
  • LDPC
  • MDPC
Canal-U
Canal-U
05.05.2015
Description : In this session, we will talk about McEliece assumptions. The security of the McEliece scheme is based on two assumptions as we have already seen: the hardness of decoding a random linear code and the problem of distinguishing a code with a prescribed structure from a random one. In this sequence, ...
  • algèbre linéaire
  • chiffrement à clé publique
  • cryptage des données
  • cryptographie
  • McEliece
  • LDPC
  • MDPC