Title: McEliece cryptosystem: simulation and security vulnerabilities

Authors: Rakesh Kumar; Allu Swamy Naidu; Ajeet Singh; Appala Naidu Tentu

Addresses: C.R. Rao Advanced Institute of Mathematics, Statistics and Computer Science, University of Hyderabad Campus, Hyderabad, 500046, India ' C.R. Rao Advanced Institute of Mathematics, Statistics and Computer Science, University of Hyderabad Campus, Hyderabad, 500046, India ' C.R. Rao Advanced Institute of Mathematics, Statistics and Computer Science, University of Hyderabad Campus, Hyderabad, 500046, India ' C.R. Rao Advanced Institute of Mathematics, Statistics and Computer Science, University of Hyderabad Campus, Hyderabad, 500046, India

Abstract: While symmetric key cryptosystems utilise single private key at both ends for encryption and decryption purposes and this mentioned scenario gives advantages of better speed-up as compare to public key cryptosystems. Still, security is a challenge while performing compatibly efficient key distribution and secure private data transfer among entities in an untrusted environment. McEliece cryptosystem, designed in 1978, is a public key based cryptosystem whose security is based on some unknown natured error-correcting codes. This paper gives state-of-the-art detailed overview on this cryptosystem, its component-wise algorithmic description and implementation. Various attacks on McEliece cryptosystem are discussed separately. The experimental results employing Goppa codes are also presented in the paper where the simulations are performed on various extension degrees. Based on the simulations performed, we concluded the results along with the various issues faced while implementation.

Keywords: public key; substitution matrix; generator matrix; permutation matrix; hamming code; irreducible polynomial.

DOI: 10.1504/IJCSM.2020.108787

International Journal of Computing Science and Mathematics, 2020 Vol.12 No.1, pp.64 - 81

Received: 01 Apr 2019
Accepted: 24 Sep 2019

Published online: 03 Aug 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article