Page 70 - ISCI’2017
P. 70

the McEliece scheme
                    Initial data                   Encryption                    Decryption (decoding)

             Information message:
                                                   Code word              Random error                      Ignored
             vector I                                                     vector

             Secret key: matrices  X
             ,  P ,  D

             Public    key:   matrix              с =  IG +   e                       с =  IG +  e
                                                                                       *
                                                   *
                                                          X
                                                   X
                                                                                       X
                                                                                              X
              G =   XGPD                          Information                           Extracted
                X
             Session key: random
             error vector e

                                                the Niederreiter scheme

                    Initial data                   Encryption                    Decryption (decoding)
                                                                           Random code
             Information message:
                                                                           word                             Ignored
             vector e

             Secret key: matrices  X
             ,  P ,  D

             Public    key:   matrix         S =  e⋅ H = ( e + с ⋅)  H           S =  e⋅ H = ( e + с ⋅)  H
                                                      T
                                                                   T
                                                                                                      T
                                                                                          T
                                                      X
                                                                                                      X
                                                                                          X
                                                                   X
                                                                                  X
                                               X
              H =   XHPD
                X
             Session key: random                     Information
             code word с  (does not                                                       Extracted
             use)
                                               Proposed author’s scheme
                    Initial data                   Encryption                    Decryption (decoding)
             Information message:                 с =  IG +   e                       с =  IG +  e
                                                                                       *
                                                   *
                                                                                              X
                                                                                       X
                                                   X
                                                          X
             vectors I and e (two                 Information            Information    Extracted           Extracted
             parts of a message)                (the first part)          (the second part)

             Secret key: matrices  X
             ,  P ,  D
             Public    key:   matrix

              G =   XGPD                 Fig. 2 – The cryptographic transformation using the codes
                X






            70
   65   66   67   68   69   70   71   72   73   74   75