Reaction Attacks against Several Public-Key Cryptosystem
- 1 January 1999
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their security on the apparent intractibility of one or more problems. The attacks we present do not violate the intractibility of the underlying problems, but instead obtain information about the private key or plaintext by watching the reaction of someone decrypting a given ciphertext with the private key. In the case of the McEliece system we must repeat the attack for each ciphertext we wish to decrypt, whereas for the Ajtai-Dwork system we are able to recover the private key.Keywords
This publication has 17 references indexed in Scilit:
- Cryptanalysis of McEliece’s Public-Key CryptosystemPublished by Springer Science and Business Media LLC ,2001
- A public-key cryptosystem with worst-case/average-case equivalencePublished by Association for Computing Machinery (ACM) ,1997
- Failure of the McEliece public-key cryptosystem under message-resend and related-message attackLecture Notes in Computer Science, 1997
- Eliminating decryption errors in the Ajtai-Dwork CryptosystemLecture Notes in Computer Science, 1997
- Cryptanalysis and modification of digital signature scheme based on error-correcting codeElectronics Letters, 1992
- Secret Error-Correcting Codes (SECC)Lecture Notes in Computer Science, 1990
- Security-Related Comments Regarding McEliece’s Public-Key CryptosystemLecture Notes in Computer Science, 1988
- A variant of a public key cryptosystem based on Goppa CodesACM SIGACT News, 1983
- On the inherent intractability of certain coding problems (Corresp.)IEEE Transactions on Information Theory, 1978
- Goppa codesIEEE Transactions on Information Theory, 1973