Sloppy Alice Attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem (original) (raw)
We introduce new adaptive chosen ciphertext attacks, called Sloppy Alic Attacks, in which a malicious sender or an adaptive eavesdropper Eve has an oracle which allows her to find out whether a sent encrypted message does, or does not, decrypt properly. From this information she can extract the plaintext that was encrypted. In this paper we show that the McEliece public-key cryptosystem is susceptible to Sloppy Alice attacks.
| Name | The Springer International Series in Engineering and Computer Science |
|---|---|
| Publisher | Springer |
| Volume | 687 |
| ISSN (Print) | 0893-3405 |
| Workshop | Information, coding and mathematics |
|---|---|
| Country/Territory | United States |
| City | Pasadena |
| Period | 24/05/02 → 25/05/02 |
SCS-Cybersecurity
n/a OA procedure
ArticleAccepted author version, 233 KB
APA
Author
BIBTEX
Harvard
Standard
RIS
Vancouver