of columns and two, our system is based on extension
field F
2
l
which makes the effective size of the matrix
l times compared to McEliece which is based on F
2
.
However, in most cases due to less number of rows the
net result indicates that our system requires shorter
keys than original McEliece. For instance, at 80-bit
security with p = 101 and l = 3 our keys are almost
half of the keys corresponding to original McEliece
at same security level. At 256-bit security level with
p = 211,t = 40 and l = 3 the proposed cryptosys-
tem has key size of about one-forth of the original
McEliece.
In Table 1, we provide some parameters for the
proposed Niederreiter cryptosystem and show in de-
tails the benefits of the proposed cryptosystem. There
are two kind of attacks – classical and quantum. For
the classical we come out with a value of m and call it
m
C
and for quantum we call it m
Q
. The maximim of
these two is the m that one should use for that said pa-
rameter. As explained earlier we use p for the size of
the matrix and t as the error correcting capacity. We
also provide success probability from classical attack,
key size and the rate of the cryptosystem.
7 CONCLUSION
In this paper, we develop a Niederreiter cryptosys-
tem using quasi-cyclic codes that is both classically
and quantum secure against the current known at-
tacks. In particular, we show that for the proposed
cryptosystem the hidden subgroup problem from the
natural reduction of the corresponding scrambler-
permutation problem is indistinguishable by quantum
Fourier sampling. We also show that the proposed
cryptosystem has high encryption rate and shorter
keys compared to classical McEliece cryptosystems.
One of the important problem that needs to be ad-
dressed is finding quasi-cyclic codes that satisfy the
suggested parameter sizes. It would be interesting to
see if the cryptosystem remains classically secure if
we use other sparse keys. It is very clear that the sys-
tem remains secure against quantum computers as the
group structure for the system remains the same. This
is important because it could reduce key sizes sub-
stantially.
REFERENCES
Aylaj, B., Belkasmi, M., Nouh, S., and Zouaki, H. (2016).
Good quasi-cyclic codes from circulant matrices con-
catenation using a heuristic model. International jour-
nal of advanced computer science and applications,
7(9):63–68.
Baldi, M., Bodrato, M., and Chiaraluce, F. (2008). A new
analysis of the McEliece cryptosystem based on QC-
LDPC codes. Security and Cryptography for Net-
works, pages 246–262.
Berlekamp, E., McEliece, R., and Van Tilborg, H. (1978).
On the inherent intractability of certain coding prob-
lems (corresp.). IEEE Transactions on Information
Theory, 24(3):384–386.
Bernstein, D. J., Lange, T., and Peters, C. Attacking and de-
fending the McEliece cryptosystem. In Post-Quantum
Cryptography. PQCrypto 2008, pages 31–46.
Blahut, R. E. (2003). Algebraic codes for data transmission.
Cambridge University Press.
Dinh, H., Moore, C., and Russell, A. (2011). McEliece and
Niederreiter cryptosystems that resist quantum fourier
sampling attacks. volume 6841 of LNCS. Crypto2011.
Dixon, J. D. and Mortimer, B. (1996). Permutation Groups.
Graduate Texts in Mathematics. Springer, New York.
Grigni, M., Schulman, L., Vazirani, M., and Vazirani, U.
(2001). Quantum mechanical algorithms for the non-
abelian hidden subgroup problem. In Proceedings of
the thirty-third annual ACM symposium on theory of
computing, pages 68–74. ACM.
Gulliver, T. A. (1989). Construction of quasi-cyclic codes.
PhD thesis, University of Victoria.
Hallgrean, S., Russell, A., and Ta-Shma, A. (2003). The
hidden subgroup problem and quantum computation
using group representation. SIAM Journal of Compu-
tation, 32(4):916–934.
Hirotomo, M., Mohri, M., and Morii, M. (2005). A prob-
abilistic computation method for the weight distribu-
tion of low-density parity-check codes. In Interna-
tional Symposium on Information Theory.
Kapshikar, U. (2018). McEliece-type cryptosystems over
quasi-cyclic codes. Master’s thesis, IISER Pune.
https://arxiv.org/abs/1805.09972.
Kempe, J. and Shalev, A. (2005). The hidden subgroup
problem and permutation group theory. In Proceed-
ings of the sixteenth annual ACM-SIAM symposium
on discrete algorithms, pages 1118–1125. Society for
Industrial and Applied Mathematics.
Lee, P. J. and Brickell, E. F. (1988). An observation on
the security of McEliece’s public-key cryptosystem.
In Eurocrypt 1988, volume 330 of LNCS, pages 275–
280. Springer.
Li, Y. X., Deng, R. H., and Wang, X. M. (1994). On the
equivalence of McEliece’s and Niederreiter’s public-
key cryptosystems. IEEE Transactions on Information
Theory, 40(1):271–273.
McElice, R. J. (1978). A public key cryptosystem based on
algebraic coding theory. Technical report, Communi-
cations system research centre, NASA.
Niederreiter, H. and Xing, C. (2009). Algebraic Geometry
in Coding Theory and Cryptography. Princeton Uni-
versity Press.
Stern, J. (1988). A method for finding codewords of small
weight. In International Colloquium on Coding The-
ory and Applications, pages 106–113. Springer.
Zeh, A. and Ling, S. Decoding of quasi-cyclic codes up
to a new lower bound on the minimum distance. In
2014 IEEE International Symposium on Information
Theory, Honolulu, HI, 2014.
A Quantum-Secure Niederreiter Cryptosystem using Quasi-Cyclic Codes
347