• Aucun résultat trouvé

Master Thesis Security proofs for code-based cryptosystems

N/A
N/A
Protected

Academic year: 2021

Partager "Master Thesis Security proofs for code-based cryptosystems"

Copied!
2
0
0

Texte intégral

(1)

Master Thesis

Security proofs for code-based cryptosystems

For one student

Domain

Cryptography and coding theory

Presentation

Most of the cryptographic schemes used and studied today are based on number theory problems as factorisation or discrete logarithm. In 1994, Shor proposed an algorithm which can factorise in polynomial time using a quantum computer. So RSA and several others schemes are threatened by the quantum computer.

Code-based cryptography is one of the branches of post-quantum cryptography with lattice- based, multivariate-based and hash-based cryptography. Schemes based on problems as syndrome decoding or decoding random codes are well studied for years and there doesn't exist polynomial time algorithm to solve those problems even in a post quantum world. McEliece was the rst to propose a code-based cryptosystem and several improvements and derivation have been proposed so far.

To prove the security of cryptographic protocols, we may use a reduction using random oracles.

Such reduction are widely proposed for number theory based scheme but they are rare for code- based cryptosystems. Some reduction already exists but they are not tight.

Purpose

After a state of the art of code-based cryptosystems and the construction of security proof in the random oracle and/or in the standard model, the student will have to propose a security proof of a code-based signature scheme and/or to signicantly improve an existing reduction like Courtois Finiasz and Sendrier signature scheme, McEliece cryptosystem or schemes combining dierent code-based schemes.

He will also have to write an article on his research in a LATEX format and give an english presentation to the team.

Goals

The outcome of the thesis is supposed to be a publishable result on provably secure code-based scheme.

(2)

Required Skills

The required skills, in order of importance, are:

ˆ High motivation and creativity;

ˆ Good knowledge of cryptographic constructions;

ˆ Experience with reading research papers.

Knowledge of the English language goes without saying.

Bibliography

[1] - L. Dallot : Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme, WEWoRC 2007.

[2] - P.-L. Cayrel, P.Gaborit, D. Galindo and M. Girault : Identity-based identication and signature schemes using error-correcting codes, preprint.

Institute

CASED : www.cased.de

Place : Darmstadt, Germany (4h30 from Paris by train)

Team : Cryptographic primitives

Master thesis supervisors : Dr. Pierre-Louis Cayrel and Markus Rückert Laboratory director : Pr. Johannes Buchmann

Contact

If you are interested, please contact Dr. Pierre-Louis Cayrel (french speaker) CASED : Center for Advanced Security Research Darmstadt

Mornewegstrasse, 32 64293 Darmstadt Germany

Phone: 0049-6151-16-64821

e-mail supervisor: pierre-louis.cayrel@cased.de

e-mail laboratory director: buchmann@cdc.informatik.tu-darmstadt.de

web : http://www.cayrel.net/

Références

Documents relatifs

Our contribution. If one compares the best known complexity estimates, the algebraic techniques appear to be less efficient than the combinatorial ones, such as [52], [39], and [10]

The contribution of ruminant production systems to protein security cannot simply be evaluated by the ratio between animal protein production and the total amount of proteins of plant

These algorithms enabled the compu- tation of a discrete logarithm in the class group of an imaginary quadratic field with 90 decimal digit discriminant [15], and the solution of

We state this finding as a requirement: Requirement 1 An authentication protocol resilient to code corruption should not (1) let the LS receive sweetwords in clear; (2) let it know

Schemes based on problems as syndrome decoding or decoding random codes are well studied for years and there doesn't exist polynomial time algorithm to solve those problems even in

Both practical and theoretical, this thesis proposes to study the physical attacks also called side-channel attacks like Simple Power Anal- ysis, Dierential Power

Both practical and theoretical, this thesis proposes to study the physical attacks also called side-channel attacks like Simple Power Anal- ysis, Dierential Power

The FLIP family of stream ciphers follow the filter permutator structure. It has first been specified in [MJSC16]. In particular, its resistance against several types of attacks