Page 61 - ISCI’2017
P. 61

Fig. 1 – Assessment of resistance of the McEliece scheme on the separable binary Goppa codes to

                                           the attack the commutation decoding


                  Dependencies, which have shown in Fig. 1, can be interpreted as the resistance estimations for

            the crypto-code transformations that expressed as the minimal number of covering sets. These sets
            need to re-consider for the decoding of any configuration error vector e. These dependences do not

            account for the computational complexity forming of word candidates, which calculated by selected
            configuration of the information set (real resistance will be higher).

                  As it follows from the above shown in Fig. 1 dependencies, the McEliece scheme provides the

            greatest resistance at using codes with the relative speed  R ≈ 2/3,  that is consistent with the
            conclusions of the most studies [28]. Parameters of some schemes with the Goppa codes and R ≈ 2/3,

            assessments of resistance to an attack  of permutation decoding, computational complexity
            assessments of encoding (encryption) and decoding (decryption), similar assessments for asymmetric

            encryption RSA and the block symmetric encryption AES (FIPS-197) / Kalyna (DSTU 7624:2014)
            [44, 45] have presented in Table 1.







                                                                                                          61
   56   57   58   59   60   61   62   63   64   65   66