CHOSUN

Design of New Public Key Encryption Scheme Based on the Polar Coding

Metadata Downloads
Author(s)
슈레스타 수잔 라흐
Issued Date
2013
Abstract
In this thesis, cryptosystem is proposed where information is transmitted over the insecure channel after encoding plain-text using the public key which is generated using the polar code. That is, the proposed system is a class of the McEliece cryptosystem, the error correcting code based cryptography, whose security is based on the difficulty of decoding of random linear codes. The McEliece cryptography is one of the oldest public key cryptography scheme and McEliece’s original proposal is known to be secure with adequate selections of related parameters even with the intensive efforts of cryptanalyses on that for over 30 years. However, since the secure sizes of public and private keys are too large, it has been considered as less practical suggestion than the other public key cryptographic schemes such as RSA or the elliptic curve cryptography, shortly ECC. Therefore, many researches have been carried to reduce public key size by using other error-correcting codes.
Later, Sidelnikov proposed another McEliece cryptosystem which uses the binary Reed Muller (RM) code, also called as Sidelnikov cryptosystem. Although RM code based cryptosystem has smaller size of parameters and more efficient decoding algorithm than McEliece’s original scheme, it was broken using the algebraic structure of the RM code by Minder and Skrollahi.
The polar code is a new kind of error correcting code which is information theoretically proved to asymptotically achieve the capacity of the given channels by Arikan and has similar structure to the RM codes. Contrary to the previous error correcting codes, the polar code depends on the given channel and utilizes the channel polarization which can be induced by using channel combining and splitting process. As a result of the channel polarization, some channels turn into good channels and the others into bad channels. While fixed bits are sent through the bad channels, user information is transmitted through good channels.
In this thesis, the polar code based public key cryptography is proposed and shown how polar code can be used to encode plaintext message and hide it by adding errors. Decoding method is shown to obtain plaintext from ciphertext using private keys and decoding.
Alternative Title
극부호에 기반한 새로운 공개키 암호화 방식 설계
Alternative Author(s)
Sujan Raj Shrestha
Affiliation
조선대학교 대학원
Department
일반대학원 정보통신공학과
Advisor
Young-Sik Kim
Awarded Date
2013-08
Table Of Contents
Table of Contents i
List of Tables iii
List of Figures iv
Acronyms v
Abstract (Korean) vi
Abstract (English) viii

Ⅰ. Introduction 1
A. Thesis Motivation and Overview 3
B. Research Objectives 4
C. Thesis Contribution 4
D. Thesis Organization 5
II. Background 7
A. McEliece Cryptosystem 7
1. Basic idea 7
2. Hardness Assumption 10
3. Parameters 10
B. Existing McEliece Cryptanalysis and variants 10
C. Reed Muller Code And RM Cryptosystem 13
1. Reed Muller Code 14
2. Sidelnikov Cryptosystem 15
3. Attack Against Sidelnikov Cryptosystem 17
D. Polar Code 21
1. Overview 19
2. Channel Polarization 22
3. Rate And Reliability Analysis 24
4. Polar Coding Method 25
5. Generator Matrix Construction 29
6. Inverse of Matrix using Gaussian Elimination 32
III. Proposed System 34
A. Construction 34
B. Private Key 35
C. Public Key 36
D. Encryption 36
E. Decryption 37
Ⅳ. Security Analysis 42
A. Brute Force Decoding Result 42
B. Brute Force Attack 47
C. Information Set Decoding Analysis 48
D. Sidelnikov Attack 50
E. Key-size and Rate Analysis 52
F. Comparison Table 53
Ⅴ. Conclusion 55
References 56
List of Publications 59
Acknowledgement 60
Degree
Master
Publisher
조선대학교 대학원
Citation
슈레스타 수잔 라흐. (2013). Design of New Public Key Encryption Scheme Based on the Polar Coding.
Type
Dissertation
URI
https://oak.chosun.ac.kr/handle/2020.oak/9860
http://chosun.dcollection.net/common/orgView/200000263906
Appears in Collections:
General Graduate School > 3. Theses(Master)
Authorize & License
  • AuthorizeOpen
  • Embargo2013-08-22
Files in This Item:

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.