Paper 2010/465

How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices

Falko Strenzke

Abstract

While it is generally believed that due to their large public key sizes code based public key schemes cannot be conveniently used when memory-constrained devices are involved, we propose an approach for Public Key Infrastructure (PKI) scenarios which totally eliminates the need to store public keys of communication partners. Instead, all the necessary computation steps are performed during the transmission of the key. We show the feasibility of the approach through an example implementation and give arguments that it will be possible for a smart card controller to carry out the associated computations to sustain the transmission rates of possible future high speed contactless interfaces.

Note: An actual implementation of the proposed approach was made and is now included in the paper.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
post-quantum cryptographycode-based cryptographypublic key encryption schemeefficient implementationembedded devices
Contact author(s)
strenzke @ flexsecure de
History
2012-04-20: revised
2010-09-08: received
See all versions
Short URL
https://ia.cr/2010/465
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/465,
      author = {Falko Strenzke},
      title = {How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices},
      howpublished = {Cryptology {ePrint} Archive, Paper 2010/465},
      year = {2010},
      url = {https://eprint.iacr.org/2010/465}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.