Page 70 - ISCI’2017
P. 70
the McEliece scheme
Initial data Encryption Decryption (decoding)
Information message:
Code word Random error Ignored
vector I vector
Secret key: matrices X
, P , D
Public key: matrix с = IG + e с = IG + e
*
*
X
X
X
X
G = XGPD Information Extracted
X
Session key: random
error vector e
the Niederreiter scheme
Initial data Encryption Decryption (decoding)
Random code
Information message:
word Ignored
vector e
Secret key: matrices X
, P , D
Public key: matrix S = e⋅ H = ( e + с ⋅) H S = e⋅ H = ( e + с ⋅) H
T
T
T
T
X
X
X
X
X
X
H = XHPD
X
Session key: random Information
code word с (does not Extracted
use)
Proposed author’s scheme
Initial data Encryption Decryption (decoding)
Information message: с = IG + e с = IG + e
*
*
X
X
X
X
vectors I and e (two Information Information Extracted Extracted
parts of a message) (the first part) (the second part)
Secret key: matrices X
, P , D
Public key: matrix
G = XGPD Fig. 2 – The cryptographic transformation using the codes
X
70