DISTINGUISHABILITY OF PUBLIC KEYS AND EXPERIMENTAL VALIDATION: THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM by Hai Pham
A Thesis Submitted to the Faculty of The Charles E. Schmidt College of Science in Partial Fulfillment of the Requirements for the Degree of Master of Science
Florida Atlantic University Boca Raton, FL December 2015 Copyright 2015 by Hai Pham
ii
ACKNOWLEDGEMENTS
I would like to express my deepest gratitude to my master thesis advisor, Dr. Steinwandt. I have learned many things since I became Dr. Steinwandt’s student. I admire his personality, his vast knowledge and his passion for cryptography. I am grateful for the time that he spent on guiding me, providing feedbacks, and sometimes giving tough love. I also would like to thank my small family (my dad, my mom, and my sister) for everything they have done for me. In addition, I owe many thanks to my big family (my grandparents, my aunts and uncles) for all their love.
iv ABSTRACT
Author: Hai Pham Title: Distinguishability of Public Keys and Experimental Validation: The McEliece Public-key Cryptosystem Institution: Florida Atlantic University Thesis Advisor: Dr. Rainer Steinwandt Degree: Master of Science Year: 2015
As quantum computers continue to develop, they pose a threat to cryptography since many popular cryptosystems will be rendered vulnerable. This is because the security of most currently used asymmetric systems requires the computational hard- ness of the integer factorization problem, the discrete logarithm or the elliptic curve discrete logarithm problem. However, there are still some cryptosystems that resist quantum computing. We will look at code-based cryptography in general and the McEliece cryptosystem specifically. Our goal is to understand the structure behind the McEliece scheme, including the encryption and decryption processes, and what some advantages and disadvantages are that the system has to offer. In addition, using the results from Courtois, Finiasz, and Sendrier’s paper in 2001 [12], we will discuss a digital signature scheme based on the McEliece cryptosystem. We analyze one classical algebraic attack against the security analysis of the system based on the distinguishing problem whether the public key of the McEliece scheme is generated from a generating matrix of a binary Goppa code or a random binary matrix. The idea of the attack involves solving an algebraic system of equations and we examine the dimension of the solution space of the linearized system of equations. With the v assistance from a paper in 2010 by Faug`ere,Gauthier-Uma˜na,Otmani, Perret, Til- lich [14], we will see the parameters needed for the intractability of the distinguishing problem.
vi To my paternal grandfather DISTINGUISHABILITY OF PUBLIC KEYS AND EXPERIMENTAL VALIDATION: THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM
List of Tables ...... x
List of Figures ...... xi
1 Cryptography ...... 1 1.1 Introduction and Motivation...... 1 1.2 Cryptosystem...... 2 1.3 The McEliece Cryptosystem...... 4
2 Background in Coding theory ...... 5 2.1 Terminology...... 5 2.2 Generator and Parity-Check Matrices...... 7 2.3 Error Detection and Error Correction...... 8 2.4 Goppa Codes and Patterson’s algorithm...... 8
3 The McEliece Cryptosystem ...... 14 3.1 Encryption and Decryption in McEliece’s scheme...... 14 3.2 Advantages and Disadvantages of the McEliece Cryptosystem.... 17 3.3 McEliece-based Digital Signature Scheme...... 18
4 A Distinguisher for Public Keys in McEliece Cryptosystems . . . 20 4.1 Motivation...... 20 4.2 The Goppa Code Distinguishing Problem...... 21 4.3 Building A Distinguisher...... 21
viii 5 Conclusion ...... 32
Bibliography ...... 33
ix LIST OF TABLES
4.1 Maximal Degree for Distinguishability ...... 20 4.2 Experimental Validation ...... 29 4.3 Observations for the Second Experiment ...... 31
x LIST OF FIGURES