Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Post-Quantum cryptography and McElliece Cryptosystem
Stockholm University, Faculty of Science, Department of Mathematics.
2024 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

The emergence of quantum computers threatens the security of many current public key cryptosystems(PKCs) by enabling quantum algorithms that can break them. Post-quantum cryptography (PQC)seeks to address this challenge with both innovative and time-tested cryptographic systems. Amongthese is the McEliece Key Encapsulation Mechanism (KEM), which utilizes Goppa codes, a type oferror-correcting code with a long history of security. This paper will explore the construction of Goppacodes, the implementation of the McEliece KEM, and an analysis of information set decoding—the mostextensively studied attack method against these systems. Additionally, we will discuss the implicationsof quantum algorithms on the security of McEliece KEM.

Abstract [sv]

Framväxten av kvantdatorer hotar säkerheten för många nuvarande publika nyckelsystem (PKC)genom att möjliggöra kvantalgoritmer som kan bryta dem. Postkvantumkryptografi (PQC) syftar tillatt hantera denna utmaning med både innovativa och beprövade kryptografiska system. Bland dessafinns McEliece Key Encapsulation Mechanism (KEM), som använder Goppa-koder, en typ av felkor-rigerande kod med en lång historia av säkerhet. Denna uppsats kommer att utforska konstruktionenav Goppa-koder, implementeringen av McEliece KEM och en analys av informationsmängdsavkodning- den mest omfattande studerade attackmetoden mot dessa system. Dessutom kommer vi att diskuterakonsekvenserna av kvantalgoritmer för säkerheten i McEliece KEM.

Place, publisher, year, edition, pages
2024. , p. 61
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:su:diva-242096OAI: oai:DiVA.org:su-242096DiVA, id: diva2:1951748
Supervisors
Available from: 2025-04-14 Created: 2025-04-13 Last updated: 2025-04-14Bibliographically approved

Open Access in DiVA

fulltext(772 kB)22 downloads
File information
File name FULLTEXT01.pdfFile size 772 kBChecksum SHA-512
8b5db473a8acd2b75cc5548c4bfd66c5fab65d3b7f3e3ad44f5292fd10f93682916a79116f357e0b0170703825fed2b6afe85fe522f4ffed943f2aa3feca7d5a
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Alwan, Ali
By organisation
Department of Mathematics
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 23 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 200 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf