This paper shows how to achieve almost all of the same reduction in key size while preserving this shield. Even if support splitting could be (1) generalized to handle an unknown support set and (2) sped up by a square-root factor, polynomial-searching attacks in the new system will still be at least as hard as information-set decoding.
Furthermore, this paper presents a set of concrete cryptanalytic challenges to encourage the cryptographic community to study the security of code-based cryptography. The challenges range through codes over F_2, F_3,..., F_32, and cover two different levels of how much the wildness is hidden.
Category / Keywords: public-key cryptography / McEliece cryptosystem, Niederreiter cryptosystem, Goppa codes, wild Goppa codes, list decoding Publication Info: expanded version Date: received 15 Sep 2011, last revised 15 Sep 2011 Contact author: c p peters at mat dtu dk Available formats: PDF | BibTeX Citation Version: 20110918:015146 (All versions of this report) Discussion forum: Show discussion | Start new discussion