Visible to the public On the implementation of mceliece with CCA2 indeterminacy by SHA-3

TitleOn the implementation of mceliece with CCA2 indeterminacy by SHA-3
Publication TypeConference Paper
Year of Publication2014
AuthorsGhosh, S.
Conference NameCircuits and Systems (ISCAS), 2014 IEEE International Symposium on
Date PublishedJune
KeywordsAlgorithm design and analysis, CCA2, CCA2 indeterminacy, CCA2 security standard, Clocks, Computer architecture, Encryption, Keccak, McEliece, McEliece algorithm, Post-quantum cryptography, post-quantum public-key algorithm, public key cryptography, public-key, secure hash algorithm, SHA-3, SHA-3 module, Vectors
Abstract

This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more randomization of the original McEliece algorithm and achieves CCA2 security standard. Due to the lightweight and high-speed implementation of SHA-3 module the proposed 128-bit secure McEliece architecture provides 6% higher performance in only 0.78 times area of the best known existing design.

DOI10.1109/ISCAS.2014.6865756
Citation Key6865756