Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2008-04

AUTHORS

R. Overbeck

ABSTRACT

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We give an overview over the existing structural attacks on the basic scheme, and show how to combine them to get an effective attack for every GPT variant. As a consequence, there are no secure parameter sets left for GPT variants, which one would like to use in practice. More... »

PAGES

280-301

References to SciGraph publications

  • 1995-07. Severely denting the Gabidulin version of the McEliece Public Key Cryptosystem in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2001. How to Achieve a McEliece-Based Digital Signature Scheme in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2001
  • 2002-07. New Technique for Decoding Codes in the Rank Metric and Its Cryptography Applications in PROBLEMS OF INFORMATION TRANSMISSION
  • 2001-07-13. The Security of the Gabidulin Public Key Cryptosystem in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’96
  • 2005. A New Structural Attack for GPT and Variants in PROGRESS IN CRYPTOLOGY – MYCRYPT 2005
  • 2001-05-18. Ideals over a Non-Commutative Ring and their Application in Cryptology in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’91
  • 2006. Extending Gibson’s Attacks on the GPT Cryptosystem in CODING AND CRYPTOGRAPHY
  • 2005-04. How to Mask the Structure of Codes for a Cryptographic Use in DESIGNS, CODES AND CRYPTOGRAPHY
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9

    DOI

    http://dx.doi.org/10.1007/s00145-007-9003-9

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1012864274


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "name": [
                "Technishe Universit\u00e4t Darmstadt, Department of Computer Science, Cryptography and Computer Algebra Group, 64289, Darmstadt, Germany"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Overbeck", 
            "givenName": "R.", 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/11554868_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008044339", 
              "https://doi.org/10.1007/11554868_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11554868_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008044339", 
              "https://doi.org/10.1007/11554868_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11779360_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010239838", 
              "https://doi.org/10.1007/11779360_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11779360_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010239838", 
              "https://doi.org/10.1007/11779360_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1023/a:1020369320078", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029851304", 
              "https://doi.org/10.1023/a:1020369320078"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46416-6_41", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030463988", 
              "https://doi.org/10.1007/3-540-46416-6_41"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46416-6_41", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030463988", 
              "https://doi.org/10.1007/3-540-46416-6_41"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45682-1_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035790215", 
              "https://doi.org/10.1007/3-540-45682-1_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf01390769", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036399286", 
              "https://doi.org/10.1007/bf01390769"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-003-6151-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040252561", 
              "https://doi.org/10.1007/s10623-003-6151-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-68339-9_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042749293", 
              "https://doi.org/10.1007/3-540-68339-9_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-68339-9_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042749293", 
              "https://doi.org/10.1007/3-540-68339-9_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/s0166-218x(02)00446-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048262370"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/s0166-218x(02)00446-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048262370"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tit.2003.820038", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061649992"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/isit.2002.1023539", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094861869"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2008-04", 
        "datePublishedReg": "2008-04-01", 
        "description": "In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We give an overview over the existing structural attacks on the basic scheme, and show how to combine them to get an effective attack for every GPT variant. As a consequence, there are no secure parameter sets left for GPT variants, which one would like to use in practice.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s00145-007-9003-9", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136278", 
            "issn": [
              "0933-2790", 
              "1432-1378"
            ], 
            "name": "Journal of Cryptology", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "21"
          }
        ], 
        "name": "Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes", 
        "pagination": "280-301", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "3d48cc5d33fac3f03586feb7e7b7e11d87cef2601df9b923f812843f7f6a0c97"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s00145-007-9003-9"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1012864274"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s00145-007-9003-9", 
          "https://app.dimensions.ai/details/publication/pub.1012864274"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T14:30", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000373_0000000373/records_13093_00000000.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "http://link.springer.com/10.1007%2Fs00145-007-9003-9"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s00145-007-9003-9'


     

    This table displays all metadata directly associated to this object as RDF triples.

    100 TRIPLES      21 PREDICATES      38 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s00145-007-9003-9 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N4c9cf552bb1c46d0b3c1d068f01f11d4
    4 schema:citation sg:pub.10.1007/11554868_5
    5 sg:pub.10.1007/11779360_15
    6 sg:pub.10.1007/3-540-45682-1_10
    7 sg:pub.10.1007/3-540-46416-6_41
    8 sg:pub.10.1007/3-540-68339-9_19
    9 sg:pub.10.1007/bf01390769
    10 sg:pub.10.1007/s10623-003-6151-2
    11 sg:pub.10.1023/a:1020369320078
    12 https://doi.org/10.1016/s0166-218x(02)00446-8
    13 https://doi.org/10.1109/isit.2002.1023539
    14 https://doi.org/10.1109/tit.2003.820038
    15 schema:datePublished 2008-04
    16 schema:datePublishedReg 2008-04-01
    17 schema:description In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We give an overview over the existing structural attacks on the basic scheme, and show how to combine them to get an effective attack for every GPT variant. As a consequence, there are no secure parameter sets left for GPT variants, which one would like to use in practice.
    18 schema:genre research_article
    19 schema:inLanguage en
    20 schema:isAccessibleForFree false
    21 schema:isPartOf N46461d9347ec4c01851efa557146447f
    22 N922226aa5ef1444ca130ec21e51c3372
    23 sg:journal.1136278
    24 schema:name Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes
    25 schema:pagination 280-301
    26 schema:productId N84bc12ea47154f529dcd32e45af6e13a
    27 N9748335c235549d0a34ab9e23c259894
    28 Nc136849f56ac43279279624fc4170a32
    29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012864274
    30 https://doi.org/10.1007/s00145-007-9003-9
    31 schema:sdDatePublished 2019-04-11T14:30
    32 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    33 schema:sdPublisher Ne9f1d4622e6f47d79a6341b1bd0a3ee3
    34 schema:url http://link.springer.com/10.1007%2Fs00145-007-9003-9
    35 sgo:license sg:explorer/license/
    36 sgo:sdDataset articles
    37 rdf:type schema:ScholarlyArticle
    38 N46461d9347ec4c01851efa557146447f schema:volumeNumber 21
    39 rdf:type schema:PublicationVolume
    40 N4c9cf552bb1c46d0b3c1d068f01f11d4 rdf:first N59a977f24a864f6bb7a8f226fbbab474
    41 rdf:rest rdf:nil
    42 N59a977f24a864f6bb7a8f226fbbab474 schema:affiliation N6f1e416e048945c39b9af55645de6aa2
    43 schema:familyName Overbeck
    44 schema:givenName R.
    45 rdf:type schema:Person
    46 N6f1e416e048945c39b9af55645de6aa2 schema:name Technishe Universität Darmstadt, Department of Computer Science, Cryptography and Computer Algebra Group, 64289, Darmstadt, Germany
    47 rdf:type schema:Organization
    48 N84bc12ea47154f529dcd32e45af6e13a schema:name readcube_id
    49 schema:value 3d48cc5d33fac3f03586feb7e7b7e11d87cef2601df9b923f812843f7f6a0c97
    50 rdf:type schema:PropertyValue
    51 N922226aa5ef1444ca130ec21e51c3372 schema:issueNumber 2
    52 rdf:type schema:PublicationIssue
    53 N9748335c235549d0a34ab9e23c259894 schema:name doi
    54 schema:value 10.1007/s00145-007-9003-9
    55 rdf:type schema:PropertyValue
    56 Nc136849f56ac43279279624fc4170a32 schema:name dimensions_id
    57 schema:value pub.1012864274
    58 rdf:type schema:PropertyValue
    59 Ne9f1d4622e6f47d79a6341b1bd0a3ee3 schema:name Springer Nature - SN SciGraph project
    60 rdf:type schema:Organization
    61 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    62 schema:name Information and Computing Sciences
    63 rdf:type schema:DefinedTerm
    64 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    65 schema:name Data Format
    66 rdf:type schema:DefinedTerm
    67 sg:journal.1136278 schema:issn 0933-2790
    68 1432-1378
    69 schema:name Journal of Cryptology
    70 rdf:type schema:Periodical
    71 sg:pub.10.1007/11554868_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008044339
    72 https://doi.org/10.1007/11554868_5
    73 rdf:type schema:CreativeWork
    74 sg:pub.10.1007/11779360_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010239838
    75 https://doi.org/10.1007/11779360_15
    76 rdf:type schema:CreativeWork
    77 sg:pub.10.1007/3-540-45682-1_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035790215
    78 https://doi.org/10.1007/3-540-45682-1_10
    79 rdf:type schema:CreativeWork
    80 sg:pub.10.1007/3-540-46416-6_41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030463988
    81 https://doi.org/10.1007/3-540-46416-6_41
    82 rdf:type schema:CreativeWork
    83 sg:pub.10.1007/3-540-68339-9_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042749293
    84 https://doi.org/10.1007/3-540-68339-9_19
    85 rdf:type schema:CreativeWork
    86 sg:pub.10.1007/bf01390769 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036399286
    87 https://doi.org/10.1007/bf01390769
    88 rdf:type schema:CreativeWork
    89 sg:pub.10.1007/s10623-003-6151-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040252561
    90 https://doi.org/10.1007/s10623-003-6151-2
    91 rdf:type schema:CreativeWork
    92 sg:pub.10.1023/a:1020369320078 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029851304
    93 https://doi.org/10.1023/a:1020369320078
    94 rdf:type schema:CreativeWork
    95 https://doi.org/10.1016/s0166-218x(02)00446-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048262370
    96 rdf:type schema:CreativeWork
    97 https://doi.org/10.1109/isit.2002.1023539 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094861869
    98 rdf:type schema:CreativeWork
    99 https://doi.org/10.1109/tit.2003.820038 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061649992
    100 rdf:type schema:CreativeWork
     




    Preview window. Press ESC to close (or click here)


    ...