Paper 2010/465
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke
Abstract
While it is generally believed that due to their large public key sizes code based public key schemes cannot be conveniently used when memory-constrained devices are involved, we propose an approach for Public Key Infrastructure (PKI) scenarios which totally eliminates the need to store public keys of communication partners. Instead, all the necessary computation steps are performed during the transmission of the key. We show the feasibility of the approach through an example implementation and give arguments that it will be possible for a smart card controller to carry out the associated computations to sustain the transmission rates of possible future high speed contactless interfaces.
Note: An actual implementation of the proposed approach was made and is now included in the paper.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- post-quantum cryptographycode-based cryptographypublic key encryption schemeefficient implementationembedded devices
- Contact author(s)
- strenzke @ flexsecure de
- History
- 2012-04-20: revised
- 2010-09-08: received
- See all versions
- Short URL
- https://ia.cr/2010/465
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/465, author = {Falko Strenzke}, title = {How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/465}, year = {2010}, url = {https://eprint.iacr.org/2010/465} }