Page 65 - ISCI’2017
P. 65

cryptosystem persistence that was built on the algebraic codes, will determine by the value ρ ∙ t, and

            provides noise immunity of transmitted cryptograms will determine the value (1 - ρ) ∙ t.
                  The third,  obviously, one from the most important positive property of the  McEliece

            cryptosystem is  high resistance to  the quantum cryptanalysis. The complexity of the quantum

            cryptanalysis  for  the code cryptosystem with the increase  its parameters increases very  fast  in
            comparison  to other  asymmetric cryptosystems, such as RSA.  Actually, the complexity of the

            cryptanalysis by the quantum algorithms is comparable with the decision of the brute force tasks of
            an equivalent keys searching of the symmetric ciphers. Data in Table 1 clearly confirms this tendency.

                  The main disadvantages of the considered code cryptosystems are huge amounts of key data
            (tens of  megabits),  reduction  in the relative  data  transmission rate (the highest  resistance of

            cryptosystem is achieved at a relative speed coding R = k / n ≈ 2/3). Will be shown below, that the

            relative data transmission rate can be substantially increased. Code cryptosystem proposed in this
            paper is removed this design disadvantage of the McEliece scheme.

                  Niederreiter cryptosystem.  An alternative cryptosystem example on the codes is the

            Niederreiter scheme, which was proposed firstly in the work [16]. Open key in this cryptosystem is a
            matrix

                                                      H =   XHPD,                                                              (22)
                                                        X
            where  H  is validation matrix of the algebraic (n, k, d)-code over GF(q) (in the original manuscript
            [16] was been proposed to use the generalized Reed-Solomon codes), X is non-degenerate (n – k) ×

            (n – k)-matrix with the elements from GF(q), P and D are permutation and a diagonal (n × n)-matrices

            (matrix P is only using to binary codes).
                  Matrices X, P and D (as and for the McEliece cryptosystem) are a secret key, which masks used

            algebraic block code under the random code (general position code), i.e. public key (22) represents

            to an attacker as a randomly formed parity- validation matrix of a linear code, for which the fast
            decoding algorithm is unknown. Conversely, authorized user, who knows the secret key (matrices X,

            P and D), can remove the masking effect of the matrices and take advantage a fast algorithm for
            decoding of the algebraic code with a validation matrix H.

                  Cryptogram Sx is a vector of (n – k)-length and it calculates by the rule

                                                                 T
                                                        S =  e⋅ H ,                                                              (23)
                                                          X
                                                                 X
            where a vector e is a vector of n-length and the (wh(e) ≤ t)-weight, which carries the confidential
            information (information message to be encrypted).

                                                                                k
                  Authorized user (who has the secret key) will  find one from q  solutions of the expression
             S =  с ⋅ H . The obtained solution is a code word with errors с =  I ⋅ G + e . Further, as and fir the
                                                                           *
                        T
                   *
              X
                                                                           X
                   X
                                                                                  X
                        X
                                                                            1 −
            McEliece scheme, authorized user builds a vector с  *  = с * X  ⋅ D  1 −  ⋅ P  and decodes the obtained word.
                                                                                                          65
   60   61   62   63   64   65   66   67   68   69   70