Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Mathematical Cryptology

Managing Editor: Magliveras, Spyros S. / Steinwandt, Rainer / Trung, Tran

Editorial Board: Blackburn, Simon R. / Blundo, Carlo / Burmester, Mike / Cramer, Ronald / Dawson, Ed / Gilman, Robert / Gonzalez Vasco, Maria Isabel / Grosek, Otokar / Helleseth, Tor / Kim, Kwangjo / Koblitz, Neal / Kurosawa, Kaoru / Lauter, Kristin / Lange, Tanja / Menezes, Alfred / Nguyen, Phong Q. / Pieprzyk, Josef / Rötteler, Martin / Safavi-Naini, Rei / Shparlinski, Igor E. / Stinson, Doug / Takagi, Tsuyoshi / Williams, Hugh C. / Yung, Moti

4 Issues per year


CiteScore 2016: 0.74

SCImago Journal Rank (SJR) 2016: 0.463
Source Normalized Impact per Paper (SNIP) 2016: 0.778

Mathematical Citation Quotient (MCQ) 2016: 0.16

Online
ISSN
1862-2984
See all formats and pricing
More options …
Volume 1, Issue 2

A Summary of McEliece-Type Cryptosystems and their Security

D. Engelbert
  • TU Darmstadt, Department of Computer Science, Cryptography and Computer Algebra Group Hochschulstraße 10, 64298 Darmstadt, Germany.
  • Email:
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ R. Overbeck
  • TU Darmstadt, GK Electronic Commerce, Department of Computer Science, Cryptography and Computer Algebra Group Hochschulstraße 10, 64298 Darmstadt, Germany.
  • Email:
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ A. Schmidt
  • TU Darmstadt, Department of Computer Science, Cryptography and Computer Algebra Group Hochschulstraße 10, 64298 Darmstadt, Germany.
  • Email:
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2007-05-21 | DOI: https://doi.org/10.1515/JMC.2007.009

In this paper we give an overview of some of the cryptographic applications which were derived from the proposal of R. J. McEliece to use error correcting codes for cryptographic purposes. Code based cryptography is an interesting alternative to number theoretic cryptography. Many basic cryptographic functions like encryption, signing, hashing, etc. can be realized using code theoretic concepts.

In this paper we briefly show how to correct errors in transmitted data by employing Goppa codes and describe possible applications to public key cryptography.

The main focus of this paper is to provide detailed insight into the state of art of cryptanalysis of the McEliece cryptosystem and the effect on different cryptographic applications. We conclude, that for code based cryptography a public key of 88KB offers sufficient security for encryption, while we need a public key of at least 597KB for secure signing.

Key Words: McEliece cryptosystem,; public key cryptography,; code based cryptography,; Goppa codes.

About the article

Published Online: 2007-05-21

Published in Print: 2007-04-01


Citation Information: Journal of Mathematical Cryptology JMC, Volume 1, Issue 2, Pages 151–199, ISSN (Online) 1862-2984, ISSN (Print) 1862-2976, DOI: https://doi.org/10.1515/JMC.2007.009.

Export Citation

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

[1]
Guomin Zhou, Peng Zeng, Xiaohui Yuan, Siyuan Chen, and Kim-Kwang Raymond Choo
Security and Communication Networks, 2017, Volume 2017, Page 1
[2]
Santosh Ghosh and Ingrid Verbauwhede
IEEE Transactions on Computers, 2014, Volume 63, Number 5, Page 1124
[3]
Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, and Eike Kohnert
IEEE Transactions on Computers, 2010, Volume 59, Number 11, Page 1533
[4]
Marco Baldi, Franco Chiaraluce, and Marco Bianchi
IET Information Security, 2013, Volume 7, Number 3, Page 212
[5]
Felipe P. Biasi, Paulo S. L. M. Barreto, Rafael Misoczki, and Wilson V. Ruggiero
Journal of Cryptographic Engineering, 2014, Volume 4, Number 2, Page 123
[6]
Falko Strenzke
Journal of Cryptographic Engineering, 2011, Volume 1, Number 4, Page 283
[7]
Ayoub Otmani, Jean-Pierre Tillich, and Léonard Dallot
Mathematics in Computer Science, 2010, Volume 3, Number 2, Page 129
[8]
Ryo Nojima, Hideki Imai, Kazukuni Kobara, and Kirill Morozov
Designs, Codes and Cryptography, 2008, Volume 49, Number 1-3, Page 289

Comments (0)

Please log in or register to comment.
Log in