Abstract
The McEliece public-key cryptosystem fails to protect any message which is sent to a recipient more than once using different random error vectors. In general, it fails to protect any messages sent to a recipient which have a known linear relation to one another. Under these conditions, which are easily detectable, the cryptosystem is subject to a devastating attack which reveals plaintext with a work factor which is 1015 times better than the best general attack.
Chapter PDF
Keywords
References
C. Adams and H. Meijer, “Security-related comments regarding McEliece's public-key cryptosystem”, Advances in Cryptology—Crypto '87 (LNCS 293), 224–228, 1988.
C. Adams and H. Meijer, “Security-related comments regarding McEliece's public-key cryptosystem”, IEEE Transactions on Information Theory, 35 (1989), 454–455.
M. Bellare and P. Rogaway, “Optimal asymmetric encryption”, Advances in Cryptology — EUROCRYPT 94 (LNCS 950), 232–249, 1994.
E.R. Berlekamp, R.J. McEliece, and H.C.A. van Tilborg, “On the inherent intractability of certain coding problems”, IEEE Transactions on Information Theory, 24 (1978), 384–386.
E.M. Gabidulin, A.V. Paramonov, and O.V. Tretjakov, “Ideals over a non-commutative ring and their application in cryptology”. Advances in Cryptology—EUROCRYPT '91 (LNCS 547), 482–489, 1991.
J.K. Gibson, “Severely denting the Gabidulin version of the McEliece public key cryptosystem”, Designs, Codes and Cryptography, 6 (1995), 37–45.
J.K. Gibson, “The security of the Gabidulin public key cryptosystem”, Advances in Cryptology—EUROCRYPT '96 (LNCS 1070), 212–223, 1996.
R. Heiman, “On the security of cryptosystems based on linear error-correcting codes”, M.Sc. Thesis, Feinburg Graduate School, Weitzmann Institute of Science, Rehovot, August, 1987.
P.J.M. Hin, “Channel-error-correcting privacy cryptosystems”, M.Sc. Thesis, Delft University of Technology, Delft, 1986.
F. Jorissen, “A security evaluation of the public-key cipher system proposed by R.J. McEliece, used as a combined scheme”, Technical report, Katholieke Universiteit Leuven, Dept. Elektrotechniek, January, 1986.
V.I. Korzhik and A.I. Turkin, “Cryptanalysis of McEliece's public-key cryptosystem”, Advances in Cryptology—EUROCRYPT 91 (LNCS 547), 68–70, 1991.
P.J. Lee and E.F. Brickell, “An observation on the security of McEliece's public-key cryptosystem”, Advances in Cryptology—EUROCRYPT '88 (LNCS 330), 275–280, 1988.
Y.X. Li, R.H. Deng, and X.M. Wang, “On the equivalence of McEliece's and Neiderreiter's public-key cryptosystem”, IEEE Transactions on Information Theory, 40 (1994), 271–273.
R.J. McEliece, “A public-key cryptosystem based on algebraic coding theory”, DSN Progress Report 42-44, Jet Propulsion Laboratory, Pasadena, 1978.
H. Neiderreiter, “Knapsack-type cryptosystems and algebraic coding theory”, Problems of Control and Information Theory, 15 (1986), 159–166.
J. Van Tilburg, “On the McEliece public-key cryptosystem”, Advances in Cryptology—Crypto '88 (LNCS 403), 119–131, 1990.
J. Van Tilburg, “Security analysis of a class of cryptosystems based on linear error-correcting codes”, Ph.D. Thesis, Technische Universiteit Eindhoven, Eindhoven, November, 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Berson, T.A. (1997). Failure of the McEliece public-key cryptosystem under message-resend and related-message attack. In: Kaliski, B.S. (eds) Advances in Cryptology — CRYPTO '97. CRYPTO 1997. Lecture Notes in Computer Science, vol 1294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0052237
Download citation
DOI: https://doi.org/10.1007/BFb0052237
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63384-6
Online ISBN: 978-3-540-69528-8
eBook Packages: Springer Book Archive