Skip to main content

On private-key cryptosystems based on product codes

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

Recently J. and R.M. Campello de Souza proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we show that J. and R.M. Campello de Souza's scheme is insecure against chosen-plaintext attacks, and consequently propose a secure modified scheme.

This work was supported in part by the National Science Council, Taiwan, under contract NSC-87-2213-E-324-003.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McEliece, R.J., “A Public-Key Cryptosystem Based on Algebraic Coding Theory,” DSN Progress Report, 42–44 (1978) 114–116

    Google Scholar 

  2. Rivest, R.L., Shamir, A., and Adleman, L.M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM21 (2) (1978) 120–126

    Article  MATH  MathSciNet  Google Scholar 

  3. ElGamal, T., “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. IT-31 (4) (1985) 469–472

    MathSciNet  Google Scholar 

  4. Korzhik, V.I., and Türkin, A.I., “Cryptanalysis of McEliece's Public-Key Cryptosystem”, Advances in Cryptology-EUROCRYPT'91, Lecture Notes in Computer Science, Springer-Verlag (1991) 68–70

    Google Scholar 

  5. Berson, T.A., “Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack,” Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science, Vol. 1294. Springer-Verlag (1997) 213–220

    Google Scholar 

  6. Rao, T.R.N., and Nam, K.H., “Private-Key Algebraic-Coded Cryptosystems,” Advances in Cryptology-CRYPTO'86, Lecture Notes in Computer Science, Springer-Verlag (1987) 35–48

    Google Scholar 

  7. Rao, T.R.N., and Nam, K.H., “Private-Key Algebraic-Code Encryption,” IEEE Trans., IT-35 (4) (1987) 829–833

    MathSciNet  Google Scholar 

  8. Hin, P.J.M., “Channel-Error-Correcting Privacy Cryptosystems,” Ph.D. Dissertation (in Dutch), Delft University of Technology (1986)

    Google Scholar 

  9. Struik, R., and Tilburg, J., “The Rao-Nam Scheme Is Insecure Against a Chosen-Plaintext Attack,” Advances in Cryptology-CRYPTO'87, Lecture Notes in Computer Science, Springer-Verlag (1988) 445–457

    Google Scholar 

  10. Brickell, E.F., and Odlyzko, A., “Cryptanalysis: A Survey of Recent Results,” Proc. IEEE 76 (5) (1988) 153–165

    Article  Google Scholar 

  11. Denny, W.F., “Encryptions Using Linear and Non-Linear Codes: Implementation and Security Considerations,” Ph.D. Dissertation, The Center for Advanced Computer Studies,University of Southwestern Louisiana, Lafayette (1988)

    Google Scholar 

  12. Struik, R., “On the Rao-Nam Scheme Using Nonlinear Codes,” in Proc. of the 1991 IEEE Int. Symp. Information Theory (1991) 174

    Google Scholar 

  13. Alencar, F.M.R., Léo, A.M.P., and Campello de Souza, R.M., “Private-Key Burst Correcting Code Encryption,” in Proc. of the 1993 IEEE Int. Symp. Information Theory (1993) 227

    Google Scholar 

  14. Campello de Souza, R.M., and Campello de Souza, J., “Array Codes for Private-Key Encryption,” Electronics Letters 30 (17) (1994) 1394–1396

    Article  Google Scholar 

  15. Sun, H.M., and Shieh, S.P., “Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes,” Proc. Third ACM Conference on Computer and Communications Security (1996) 153–156

    Google Scholar 

  16. A1 Jabri, A., “Security of Private-Key Encryption Based on Array Codes”, Electronics Letters 32 (24) (1996) 2226–2227

    Article  Google Scholar 

  17. Campello de Souza, J., and Campello de Souza, R.M., “Product Codes and Private-Key Encryption,” in Proc. of the 1995 IEEE Int. Symp. Information Theory (1995) 489

    Google Scholar 

  18. Ross, S., A First Course in Probability, Prentice-Hall (1994)

    Google Scholar 

  19. Hwang, T., and Rao, T.R.N., “On the Generation of Large (s, s−1) Pairs and Permutation Matrices over the Binary Field,” Tech. Rep. Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette (1986)

    Google Scholar 

  20. Sun, H.M., and Hwang, T., “Key Generation of Algebraic-Code Cryptosystems”, Computers and Mathematics with Applications 27 (2) (1994) 99–106

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sun, H.M., Shieh, S.P. (1998). On private-key cryptosystems based on product codes. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053722

Download citation

  • DOI: https://doi.org/10.1007/BFb0053722

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics