Some Applications of coding theory in cryptography

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Both coding theory and cryptography have been already proven to be essential in our information age. While they may seem to achieve opposite goals at rst sight, they share much more than that. This thesis aims to reveal at least part of that relation: how coding theory can be applied in cryptography.

Author(s): Doumen,Jeroen
Year: 2000

Language: English
Pages: 88
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;

Contents......Page 5
Preface......Page 7
Cryptography......Page 9
Coding Theory......Page 10
Goppa codes......Page 11
The Maximal Error Property......Page 14
Introduction......Page 17
The McEliece Public--Key Cryptosystem......Page 19
An adaptive chosen ciphertext attack......Page 20
Countermeasures......Page 25
Conclusion......Page 27
Introduction......Page 29
Description of the Xinmei scheme......Page 31
Some weaknesses in the Xinmei scheme......Page 32
The Alabbadi--Wicker scheme......Page 34
Modifying the Alabbadi--Wicker scheme......Page 36
Resistance of the Alabbadi--Wicker scheme against attacks......Page 37
A universal forgery of the Alabbadi--Wicker scheme......Page 38
Cryptanalyzing the modified Alabbadi--Wicker scheme......Page 42
Discussion......Page 43
Conclusion......Page 44
Testing for primality......Page 45
Prime-generating elliptic curves......Page 47
A primality test for certain elliptic curves......Page 49
The Wagstaff conjecture......Page 53
Some properties of elliptic curves......Page 57
Pseudorandom sequences......Page 59
Using additive characters......Page 61
Using multiplicative characters......Page 66
Using linear recurrence relations on elliptic curves......Page 71
Conclusion......Page 73
Bibliography......Page 75
Index......Page 81
Acknowledgements......Page 83
Samenvatting......Page 85
Curriculum Vitae......Page 87