Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2008-04

AUTHORS

R. Overbeck

ABSTRACT

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We give an overview over the existing structural attacks on the basic scheme, and show how to combine them to get an effective attack for every GPT variant. As a consequence, there are no secure parameter sets left for GPT variants, which one would like to use in practice. More... »

PAGES

280-301

References to SciGraph publications

  • 1995-07. Severely denting the Gabidulin version of the McEliece Public Key Cryptosystem in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2001. How to Achieve a McEliece-Based Digital Signature Scheme in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2001
  • 2002-07. New Technique for Decoding Codes in the Rank Metric and Its Cryptography Applications in PROBLEMS OF INFORMATION TRANSMISSION
  • 2001-07-13. The Security of the Gabidulin Public Key Cryptosystem in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’96
  • 2005. A New Structural Attack for GPT and Variants in PROGRESS IN CRYPTOLOGY – MYCRYPT 2005
  • 2001-05-18. Ideals over a Non-Commutative Ring and their Application in Cryptology in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’91
  • 2006. Extending Gibson’s Attacks on the GPT Cryptosystem in CODING AND CRYPTOGRAPHY
  • 2005-04. How to Mask the Structure of Codes for a Cryptographic Use in DESIGNS, CODES AND CRYPTOGRAPHY
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9

    DOI

    http://dx.doi.org/10.1007/s00145-007-9003-9

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1012864274


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "name": [
                "Technishe Universit\u00e4t Darmstadt, Department of Computer Science, Cryptography and Computer Algebra Group, 64289, Darmstadt, Germany"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Overbeck", 
            "givenName": "R.", 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/11554868_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008044339", 
              "https://doi.org/10.1007/11554868_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11554868_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008044339", 
              "https://doi.org/10.1007/11554868_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11779360_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010239838", 
              "https://doi.org/10.1007/11779360_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11779360_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010239838", 
              "https://doi.org/10.1007/11779360_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1023/a:1020369320078", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029851304", 
              "https://doi.org/10.1023/a:1020369320078"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46416-6_41", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030463988", 
              "https://doi.org/10.1007/3-540-46416-6_41"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46416-6_41", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030463988", 
              "https://doi.org/10.1007/3-540-46416-6_41"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45682-1_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035790215", 
              "https://doi.org/10.1007/3-540-45682-1_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf01390769", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036399286", 
              "https://doi.org/10.1007/bf01390769"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-003-6151-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040252561", 
              "https://doi.org/10.1007/s10623-003-6151-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-68339-9_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042749293", 
              "https://doi.org/10.1007/3-540-68339-9_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-68339-9_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042749293", 
              "https://doi.org/10.1007/3-540-68339-9_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/s0166-218x(02)00446-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048262370"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/s0166-218x(02)00446-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048262370"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tit.2003.820038", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061649992"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/isit.2002.1023539", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094861869"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2008-04", 
        "datePublishedReg": "2008-04-01", 
        "description": "In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We give an overview over the existing structural attacks on the basic scheme, and show how to combine them to get an effective attack for every GPT variant. As a consequence, there are no secure parameter sets left for GPT variants, which one would like to use in practice.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s00145-007-9003-9", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136278", 
            "issn": [
              "0933-2790", 
              "1432-1378"
            ], 
            "name": "Journal of Cryptology", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "21"
          }
        ], 
        "name": "Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes", 
        "pagination": "280-301", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "3d48cc5d33fac3f03586feb7e7b7e11d87cef2601df9b923f812843f7f6a0c97"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s00145-007-9003-9"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1012864274"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s00145-007-9003-9", 
          "https://app.dimensions.ai/details/publication/pub.1012864274"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T14:30", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000373_0000000373/records_13093_00000000.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "http://link.springer.com/10.1007%2Fs00145-007-9003-9"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9'


     

    This table displays all metadata directly associated to this object as RDF triples.

    100 TRIPLES      21 PREDICATES      38 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s00145-007-9003-9 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N3e35fadf76264f139dbb316a63b3a203
    4 schema:citation sg:pub.10.1007/11554868_5
    5 sg:pub.10.1007/11779360_15
    6 sg:pub.10.1007/3-540-45682-1_10
    7 sg:pub.10.1007/3-540-46416-6_41
    8 sg:pub.10.1007/3-540-68339-9_19
    9 sg:pub.10.1007/bf01390769
    10 sg:pub.10.1007/s10623-003-6151-2
    11 sg:pub.10.1023/a:1020369320078
    12 https://doi.org/10.1016/s0166-218x(02)00446-8
    13 https://doi.org/10.1109/isit.2002.1023539
    14 https://doi.org/10.1109/tit.2003.820038
    15 schema:datePublished 2008-04
    16 schema:datePublishedReg 2008-04-01
    17 schema:description In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We give an overview over the existing structural attacks on the basic scheme, and show how to combine them to get an effective attack for every GPT variant. As a consequence, there are no secure parameter sets left for GPT variants, which one would like to use in practice.
    18 schema:genre research_article
    19 schema:inLanguage en
    20 schema:isAccessibleForFree false
    21 schema:isPartOf N14d6a3b6076a4ee186d8edea9a09ace0
    22 N852634abd6674acd85b91a1c2ae8acb8
    23 sg:journal.1136278
    24 schema:name Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes
    25 schema:pagination 280-301
    26 schema:productId N243c232be1f84e15af59b203a9d237a2
    27 N5eeaca35a3ba4294a72451de3582950d
    28 Nd2466d672ac5463b91b0515320232ed1
    29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012864274
    30 https://doi.org/10.1007/s00145-007-9003-9
    31 schema:sdDatePublished 2019-04-11T14:30
    32 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    33 schema:sdPublisher Nbd23d4353f2145cd8a71d1402cc60547
    34 schema:url http://link.springer.com/10.1007%2Fs00145-007-9003-9
    35 sgo:license sg:explorer/license/
    36 sgo:sdDataset articles
    37 rdf:type schema:ScholarlyArticle
    38 N14d6a3b6076a4ee186d8edea9a09ace0 schema:issueNumber 2
    39 rdf:type schema:PublicationIssue
    40 N243c232be1f84e15af59b203a9d237a2 schema:name doi
    41 schema:value 10.1007/s00145-007-9003-9
    42 rdf:type schema:PropertyValue
    43 N3e35fadf76264f139dbb316a63b3a203 rdf:first N784923fd2b9c4b5aa4f041f52cf9af46
    44 rdf:rest rdf:nil
    45 N5eeaca35a3ba4294a72451de3582950d schema:name dimensions_id
    46 schema:value pub.1012864274
    47 rdf:type schema:PropertyValue
    48 N784923fd2b9c4b5aa4f041f52cf9af46 schema:affiliation Nc4095b41e3794b97b97a7023fd8f1e94
    49 schema:familyName Overbeck
    50 schema:givenName R.
    51 rdf:type schema:Person
    52 N852634abd6674acd85b91a1c2ae8acb8 schema:volumeNumber 21
    53 rdf:type schema:PublicationVolume
    54 Nbd23d4353f2145cd8a71d1402cc60547 schema:name Springer Nature - SN SciGraph project
    55 rdf:type schema:Organization
    56 Nc4095b41e3794b97b97a7023fd8f1e94 schema:name Technishe Universität Darmstadt, Department of Computer Science, Cryptography and Computer Algebra Group, 64289, Darmstadt, Germany
    57 rdf:type schema:Organization
    58 Nd2466d672ac5463b91b0515320232ed1 schema:name readcube_id
    59 schema:value 3d48cc5d33fac3f03586feb7e7b7e11d87cef2601df9b923f812843f7f6a0c97
    60 rdf:type schema:PropertyValue
    61 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    62 schema:name Information and Computing Sciences
    63 rdf:type schema:DefinedTerm
    64 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    65 schema:name Data Format
    66 rdf:type schema:DefinedTerm
    67 sg:journal.1136278 schema:issn 0933-2790
    68 1432-1378
    69 schema:name Journal of Cryptology
    70 rdf:type schema:Periodical
    71 sg:pub.10.1007/11554868_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008044339
    72 https://doi.org/10.1007/11554868_5
    73 rdf:type schema:CreativeWork
    74 sg:pub.10.1007/11779360_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010239838
    75 https://doi.org/10.1007/11779360_15
    76 rdf:type schema:CreativeWork
    77 sg:pub.10.1007/3-540-45682-1_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035790215
    78 https://doi.org/10.1007/3-540-45682-1_10
    79 rdf:type schema:CreativeWork
    80 sg:pub.10.1007/3-540-46416-6_41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030463988
    81 https://doi.org/10.1007/3-540-46416-6_41
    82 rdf:type schema:CreativeWork
    83 sg:pub.10.1007/3-540-68339-9_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042749293
    84 https://doi.org/10.1007/3-540-68339-9_19
    85 rdf:type schema:CreativeWork
    86 sg:pub.10.1007/bf01390769 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036399286
    87 https://doi.org/10.1007/bf01390769
    88 rdf:type schema:CreativeWork
    89 sg:pub.10.1007/s10623-003-6151-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040252561
    90 https://doi.org/10.1007/s10623-003-6151-2
    91 rdf:type schema:CreativeWork
    92 sg:pub.10.1023/a:1020369320078 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029851304
    93 https://doi.org/10.1023/a:1020369320078
    94 rdf:type schema:CreativeWork
    95 https://doi.org/10.1016/s0166-218x(02)00446-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048262370
    96 rdf:type schema:CreativeWork
    97 https://doi.org/10.1109/isit.2002.1023539 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094861869
    98 rdf:type schema:CreativeWork
    99 https://doi.org/10.1109/tit.2003.820038 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061649992
    100 rdf:type schema:CreativeWork
     




    Preview window. Press ESC to close (or click here)


    ...