Sloppy Alice Attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem

Eric R. Verheul, Jeroen M. Doumen, Henk C.A. van Tilborg

Research output: Contribution to conferencePaperAcademic

Abstract

We introduce new adaptive chosen ciphertext attacks, called Sloppy Alic Attacks, in which a malicious sender or an adaptive eavesdropper Eve has an oracle which allows her to find out whether a sent encrypted message does, or does not, decrypt properly. From this information she can extract the plaintext that was encrypted. In this paper we show that the McEliece public-key cryptosystem is susceptible to Sloppy Alice attacks.
Original languageUndefined
Pages99-119
Publication statusPublished - 2002
Externally publishedYes
EventInformation, coding and mathematics: proceedings of workshop honoring prof. Bob McEliece on his 60th birthday / ed. by Mario Blaum [et al.] -
Duration: 1 Jan 20021 Jan 2002

Other

OtherInformation, coding and mathematics: proceedings of workshop honoring prof. Bob McEliece on his 60th birthday / ed. by Mario Blaum [et al.]
Period1/01/021/01/02

Keywords

  • IR-56319

Cite this