On the Security of Digital Signature Schemes Based on Error-Correcting Codes

AbstractIn this paper we discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the redundancy of public keys. Another weakness is found in the Alabbadi-Wicker scheme, which results in a universal forgery attack against it. This attack shows that the Alabbadi-Wicker scheme fails to implement the necessary property of a digital signature scheme: it is infeasible to find a false signature algorithm D⋆from the public verification algorithm E such that E(D⋆ ( $$\underline m $$ )) = $$\underline m $$ for all messages $$\underline m $$ . Further analysis shows that this new weakness also applies to the Xinmei scheme.

[1]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  T. R. N. Rao,et al.  Private-key algebraic-code encryptions , 1989, IEEE Trans. Inf. Theory.

[4]  M. Alabbadi,et al.  Susceptibility of digital signature schemes based on error-correcting codes to universal forgery , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[5]  Thomas A. Berson,et al.  Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack , 1997, CRYPTO.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[8]  Florent Chabaud,et al.  On the Security of Some Cryptosystems Based on Error-correcting Codes , 1994, EUROCRYPT.

[9]  Elwyn R. Berlekamp,et al.  On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[10]  Wang Xin-mei,et al.  Digital signature scheme based on error-correcting codes , 1990 .

[11]  Stephen B. Wicker,et al.  A Digital Signature Scheme Based on Linear Error-correcting Block Codes , 1994, ASIACRYPT.

[12]  Anne Canteaut,et al.  Cryptanalysis of the Original McEliece Cryptosystem , 1998, ASIACRYPT.

[13]  Gregory A. Kabatiansky,et al.  A Digital Signature Scheme Based on Random Error-Correcting Codes , 1997, IMACC.

[14]  Henk C. A. van Tilborg,et al.  Sloppy Alice Attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem , 2002 .

[15]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[16]  Jacques Stern,et al.  A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.

[17]  Stephen B. Wicker,et al.  Cryptanalysis of the Harn and Wang modification of the Xinmei digital signature scheme , 1992 .

[18]  Eric R. Verheul,et al.  Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece cryptosystem , 2002 .

[19]  J. van Tilburg,et al.  Security-analysis of a class of cryptosystems based on linear error-correcting codes , 1994 .

[20]  J. van Tilburg Cryptanalysis of Xinmei digital signature scheme , 1992 .

[21]  Stephen B. Wicker,et al.  Security of Xinmei digital signature scheme , 1992 .

[22]  Lein Harn,et al.  Cryptanalysis and modification of digital signature scheme based on error-correcting code , 1992 .

[23]  Henk C. A. van Tilborg,et al.  An Introduction to Cryptology , 1988 .