Niederreiter cryptosystem
this wiki
Template:No footnotes In cryptography, the Niederreiter cryptosystem is a variation of the McEliece Cryptosystem developed in 1986 by Harald Niederreiter ^{[1]}. It applies the very same idea to the parity check matrix H of a linear code. Niederreiter is equivalent to McEliece from a security point of view. It uses a syndrome as ciphertext and the message is an error pattern. The encryption of Niederreiter is about ten times faster than the encryption of McEliece. Niederreiter can be used to construct a digital signature scheme.
Scheme definitionEdit
Niederreiter's original proposal was broken^{[2]} but the system is secure when used with a binary Goppa code.
Key generationEdit
 Alice selects a binary (n, k)linear Goppa code G capable of correcting t errors. This code possesses an efficient decoding algorithm.
 Alice generates a (n − k) × n parity check matrix H for the code G.
 Alice selects a random (n − k) × (n − k) binary nonsingular matrix S.
 Alice selects a random n × n permutation matrix P.
 Alice computes the (n − k) × n matrix H^{pub} = SHP.
 Alice’s public key is (H^{pub}, t); her private key is (S, H, P).
Message encryption Edit
Suppose Bob wishes to send a message m to Alice whose public key is (H^{pub}, t):
 Bob encodes the message m as a binary string of length n and weight t.
 Bob computes the ciphertext as c = H^{pub}m^{T}.
Message decryption Edit
Upon receipt of c = H^{pub}m^{T} from Bob, Alice does the following to retrieve the message m.
 Alice computes S^{−1}c = HPm^{T}.
 Alice applies a syndrome decoding algorithm for G to recover Pm^{T}.
 Alice computes the message m via m^{T} = P^{−1}Pm^{T}.
Recommended values for these parameters are n = 1024, t = 38, k = 644.
Signature schemeEdit
Courtois, Finiasz and Sendrier showed how the Niederreiter cryptosystem can be used to derive a signature scheme ^{[3]}.
 Hash the document d to be signed (with a public hash algorithm).
 Decrypt this hash value as if it were an instance of ciphertext.
 Append the decrypted message to the document as a signature.
Verification then applies the public encryption function to the signature and checks whether or not this equals the hash value of the document. When using Niederreiter, or in fact any cryptosystem based on error correcting codes, the second step in the signature scheme almost always fails. This is because a random syndrome usually corresponds to an error pattern of weight greater than t. The system then specifies a deterministic way of tweaking d until one is found which can be decrypted.
The choice of the code parameters is related to the probability that a random syndrome is decodable. Courtois, Finiaz, and Sendrier suggest the parameter values n = 2^{16} and t = 9. Then the probability to decode a random syndrome is . Therefore a decodable syndrome is found after an expected number of 9! attempts. Add a counter i to the original document d, to produce a slightly altered document d_{i}. Hashing d_{i} gives a syndrome that depends on i. Let i run from 0 to i_{0}, with i_{0} the first value of i for which d_{i} is decodable. In this case the decrypted message is a word z of length n and weight 9, such that Hz^{T} equals the hash value of d_{i0}. The signature will be z combined with the value i_{0} for verification. This signature is attached to the original document d.
References Edit
 Henk C. A. van Tilborg. Fundamentals of Cryptology, 11.4.
External linksEdit
 Attacking and defending the McEliece cryptosystem Daniel J. Bernstein and Tanja Lange and Christiane Peters
