Cryptology ePrint Archive: Report 2010/465

How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices

Falko Strenzke

Abstract: While it is generally believed that due to their large public key sizes code based public key schemes cannot be conveniently used when memory-constrained devices are involved, we propose an approach for Public Key Infrastructure (PKI) scenarios which totally eliminates the need to store public keys of communication partners. Instead, all the necessary computation steps are performed during the transmission of the key. We show the feasibility of the approach through an example implementation and give arguments that it will be possible for a smart card controller to carry out the associated computations to sustain the transmission rates of possible future high speed contactless interfaces.

Category / Keywords: public-key cryptography / post-quantum cryptography, code-based cryptography, public key encryption scheme, efficient implementation, embedded devices

Date: received 2 Sep 2010, last revised 20 Apr 2012

Contact author: strenzke at flexsecure de

Available format(s): PDF | BibTeX Citation

Note: An actual implementation of the proposed approach was made and is now included in the paper.

Version: 20120420:173627 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]