Skip to Main content Skip to Navigation
Book sections

Cryptography Based on Error Correcting Codes : A Survey

Abstract : Breaking contemporary cryptographic algorithms using any binary computer has at least sub-exponential complexity. However, if a quantum computer was used effectively, then our asymmetric cryptography would not be secure anymore. Since the code-based cryptography (cryptography based on error-correcting codes) relies on different problems, it is not as threatened as, for example, RSA or ECC. Recent years have been crucial in the progress of cryptography based on error-correcting codes. In contrast to the number-theoretic problems typically used in cryptography nowadays, certain instances of the underlying problems of code-based cryptography remain unbroken even employing quantum cryptanalysis. Thus, some code-based cryptography constructions belong to the post-quantum cryptography, especially cryptosystems based on binary irreducible Goppa codes. Many attempts to replace this underlying code in order to reduce the key size already have been proposed. Unfortunately, almost all of them have been broken. For instance, just a while ago, Reed Muller, Generalized Reed-Solomon Codes, and Convolutional codes were broken. Against some rank metric codes, a new attack was introduced. On the other hand, two prospective countermeasures in order to hide the exploitable code structure of the broken codes were fashioned. However, only the choice of binary irreducible Goppa codes remains secure in the post-quantum sense. This chapter surveys the more recent developments in code-based cryptography as well as implementations and side channel attacks. This work also recalls briefly the basic ideas, and provides a roadmap to readers.
Complete list of metadata
Contributor : Nathalie Bochard Connect in order to contact the contributor
Submitted on : Thursday, June 26, 2014 - 9:20:14 AM
Last modification on : Saturday, June 25, 2022 - 10:54:56 AM




Marek Repka, Pierre-Louis Cayrel. Cryptography Based on Error Correcting Codes : A Survey. Sattar B. Sadkhan Al Maliky (University of Babylon, Iraq) and Nidaa A. Abbas (University of Babylon, Iraq). Multidisciplinary Perspectives in Cryptology and Information Security, IGI Global, chapter 5: 133-155, 2014, ⟨10.4018/978-1-4666-5808-0.ch005⟩. ⟨ujm-01015189⟩



Record views