Fig 6 - uploaded by Newroz Nooralddin Abdulrazaq
Content may be subject to copyright.
Source publication
The McEliece cryptosystem is an asymmetric type of cryptography based on error correction code. The classical McEliece used irreducible binary Goppa code which considered unbreakable until now especially with parameter [1024, 524, and 101], but it is suffering from large public key matrix which leads to be difficult to be used practically. In this...
Similar publications
This article presents a robotic integration system, based on machine vision and acquisition of the signals for the Human-Machine interaction in the delivery and reception of tools. By using the Microsoft Kinect v1.0 sensor, it is possible to spatially locate the manipulator using the RGB camera to which the conversion of color spaces and filters wi...
Buku ini ditujukan untuk pengembang yang ingin mempelajari pembuatan aplikasi mobile berbasis platform Android dengan menggunakan teknologi Microsoft seperti bahasa C# dan Visual Studio 2017.
In this study, the problem of vectorization of raster images, is addressed; also discussed genetic algorithms and how to be able to use genetic algorithms over of vectorization of raster images and the results of the studies done. In the extent of such studies, an application for vectorization of raster images is going to be implemented using genet...
The efficiency of electric vehicles is becoming more and more important every day. Accurate determination of the speed values that the electric vehicle driver has to go at different slopes of the road route enables the electrical vehicle to be used more efficiently. Inefficient use of vehicles with different slope values of the road compared to eng...
Citations
... The Binary Goppa code is denoted by Γ(g(z); L), where g(z) is a Goppa generator polynomial of degree t over the extension field GF(2 m ) and L is the range of code such that L⊆GF(2 m ) [14]. ...
... When the errors are fixed, the received message can be decoded [14], using equation (5), which can be written as matrix representation: ...
Side channel attack is the most efficient attack against original McEliece cryptosystem, especially ball-collision and Bernstein et al. Stern attacks. The modified Stern attack has an ability to break original McEliece cryptosystem with parameter [1024, 524, 101] in 1400 days with personal computers. While with 200 clusters CPU breaking could be done in 7 days. While ball-collision attacks have smaller exponent time than Stern algorithm. This paper will present a modified version of Patterson decoding algorithm using a new evaluation for finding error locations. This approach gave the sender an opportunity to choose errors less than identified errors in public key without notifying the receiver; therefore, it reduces the probability of modified Stern attack against McEliece cryptosystem to (0.02) and increases exponent time of ball-collision attack. In this paper also the leakage of proposed implementation has been measured using a measurement type for possible leakage in Patterson’s decoding algorithm suggested by previous work, and we concluded that the designed system have fewer leakage compared to previous implementation. The work has done using Visual Studio C#.