21.02.2013 Views

Goppa Codes - Department of Mathematics

Goppa Codes - Department of Mathematics

Goppa Codes - Department of Mathematics

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Goppa</strong> <strong>Codes</strong> Key One Chung<br />

✬<br />

3.7 Discussion<br />

✫<br />

m −−−→<br />

encrypt c −−−→<br />

encode c ′ −−−−−→<br />

public line c ′ + e −−−→<br />

decode c −−−→<br />

decrypt m<br />

m −−−→<br />

encrypt c = m � G + e −−−−−→<br />

public line c ′ = m � G + e + e ′ −−−→<br />

decrypt m<br />

Assume that we have a <strong>Goppa</strong> code C(n, k) with the minimum distance<br />

d = 2t + 1. As we stated, if t ≥ 50 and n ≥ 2 10 , then McEliece Cryptosystem<br />

is considered to be fairly secure. However, we need a big key size. We know that<br />

cellular phone does not require much security. Therefore, it would be a good<br />

problem to find a proper t, t ′ and n having a little security for cellular phone and<br />

not so much big key size. In this case, we can correct up to t − t ′ errors.<br />

✩<br />

✪<br />

Page 34

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!