Page 69 - ISCI’2017
P. 69

Thus, resistant to all known attacks the McEliece and Niederreiter cryptosystems based the binary

            Goppa code comparable to the relative data rates. The highest resistance is provided for the relative
            data rate 1/2 .. 2/3 and this significant disadvantage is partially removed in the following proposed

            cryptosystem.
                  Proposed authors’ cryptosystem.  Inherently  the proposed cryptosystem  is a  further

            development of the McEliece scheme with additional encoding of information data according to the
            Niederreiter scheme. Cryptographic transformation process using the codes schematically shows in

            Fig. 2:

                −  in the McEliece scheme an  information  is placed  in the code word  of the  masked code.
                    Encryption consists of adding the random error vector, which can be interpreted as the session

                    (one-time) key. Decryption is decoding the code word, i.e. removal of the random error vector

                    from the code word, which includes an information sequence;
                −  in the Niederreiter scheme an  information  is placed  in the error vector  (by  means of

                    equilibrium encoding). Syndromic sequence of the masked code that is not dependent on code
                    word calculates  by  the formed vector, i.e. arbitrary  code word (considered to be zero by

                    default) can be added to original error vector. The syndromic vector can uniquely decode this
                    word on the receiving side, only this information is not extracted from a code word but from

                    the error vector;

                −  an information sequence is divided into two parts in the proposed scheme. The first part is
                    placed  into a code word;  the second part is placed  into  the error vector  (by  means of

                    equilibrium encoding). These two parts can be additionally transformed (mixed, encrypted,

                    etc.) to increasing of a resistance. Further, all transformations are done as in the McEliece
                    scheme. However, on the receiving side both an information is extracted from a code word

                    (the first part) and from error vector (the second part).



























                                                                                                          69
   64   65   66   67   68   69   70   71   72   73   74