Cryptanalysis of the Sidelnikov cryptosystem
Lorenz Minder, Amin Shokrollahi
{lorenz.minder,amin.shokrollahi}@epfl.ch.
LMA, EPFL
Cryptanalysis of the Sidelnikov cryptosystem – p.1/18
Cryptanalysis of the Sidelnikov cryptosystem Lorenz Minder, Amin - - PowerPoint PPT Presentation
Cryptanalysis of the Sidelnikov cryptosystem Lorenz Minder, Amin Shokrollahi { lorenz.minder,amin.shokrollahi } @epfl.ch. LMA, EPFL Cryptanalysis of the Sidelnikov cryptosystem p.1/18 McEliece type cryptosystems PKCS based on
Lorenz Minder, Amin Shokrollahi
{lorenz.minder,amin.shokrollahi}@epfl.ch.
LMA, EPFL
Cryptanalysis of the Sidelnikov cryptosystem – p.1/18
Cryptanalysis of the Sidelnikov cryptosystem – p.2/18
Cryptanalysis of the Sidelnikov cryptosystem – p.3/18
2,
Cryptanalysis of the Sidelnikov cryptosystem – p.4/18
Cryptanalysis of the Sidelnikov cryptosystem – p.5/18
Cryptanalysis of the Sidelnikov cryptosystem – p.6/18
Cryptanalysis of the Sidelnikov cryptosystem – p.7/18
1 − v1, . . . , v2 m − vm)≤r
i=0
i
Cryptanalysis of the Sidelnikov cryptosystem – p.8/18
Cryptanalysis of the Sidelnikov cryptosystem – p.9/18
Cryptanalysis of the Sidelnikov cryptosystem – p.10/18
2 \ {ˆ
v1 to v7 Chi(I) f
Cryptanalysis of the Sidelnikov cryptosystem – p.11/18
t times
Cryptanalysis of the Sidelnikov cryptosystem – p.12/18
Cryptanalysis of the Sidelnikov cryptosystem – p.13/18
supp(f) is contained within a single inner word.
supp(f) be of minimum weight. If xi = 1 = xj,
Cryptanalysis of the Sidelnikov cryptosystem – p.14/18
Cryptanalysis of the Sidelnikov cryptosystem – p.15/18
Cryptanalysis of the Sidelnikov cryptosystem – p.16/18
Cryptanalysis of the Sidelnikov cryptosystem – p.17/18
Cryptanalysis of the Sidelnikov cryptosystem – p.18/18