Oppgaven er ikke lenger tilgjengelig

Implementation of key-exchange based on McEliece cryptosystem

This project focuses on implementing the McEliece key-exchange method for secure parameter choices and investigate how the various parts (particularly key generation) can be optimized.

Bildet kan inneholde: logo, font.

Post quantum key exchange algorithms based on hard problems from coding theory are believed to be secure post quantum candidates. The McEliece cryptosystem was introduced in the 70s and has been surprisingly stable against cryptanalysis up until this day. However, it has practical limitations with regards to implementation. In particular, key generation can be slow which can make it unsuitable for forward secrecy. Thus, in this project the aim is to implement McEliece (or Niederreiter) for secure parameter choices and investigate how the various parts (particularly key generation) can be optimized. It is recommended that implementations for simulations are done in C/C++ (Alternatively, optimization for FPGAs).

Publisert 30. sep. 2019 09:45 - Sist endret 29. okt. 2019 14:13

Veileder(e)

Student(er)

  • Petter Nyland Røneid

Omfang (studiepoeng)

60