On the implementation of mceliece with CCA2 indeterminacy by SHA-3
Title | On the implementation of mceliece with CCA2 indeterminacy by SHA-3 |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Ghosh, S. |
Conference Name | Circuits and Systems (ISCAS), 2014 IEEE International Symposium on |
Date Published | June |
Keywords | Algorithm design and analysis, CCA2, CCA2 indeterminacy, CCA2 security standard, Clocks, Computer architecture, Encryption, Keccak, McEliece, McEliece algorithm, Post-quantum cryptography, post-quantum public-key algorithm, public key cryptography, public-key, secure hash algorithm, SHA-3, SHA-3 module, Vectors |
Abstract | This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more randomization of the original McEliece algorithm and achieves CCA2 security standard. Due to the lightweight and high-speed implementation of SHA-3 module the proposed 128-bit secure McEliece architecture provides 6% higher performance in only 0.78 times area of the best known existing design. |
DOI | 10.1109/ISCAS.2014.6865756 |
Citation Key | 6865756 |