Variations of the McEliece Cryptosystem

Jessalyn Bolkema, Heide Gluesing-Luerssen, Christine A. Kelley, Kristin E. Lauter, Beth Malmskog, Joachim Rosenthal

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

5 Scopus citations


Two variations of the McEliece cryptosystem are presented. The first is based on a relaxation of the column permutation in the classical McEliece scrambling process. This is done in such a way that the Hamming weight of the error, added in the encryption process, can be controlled so that efficient decryption remains possible. The second variation is based on the use of spatially coupled moderate-density parity-check codes as secret codes. These codes are known for their excellent error-correction performance and allow for a relatively low key size in the cryptosystem. For both variants the security with respect to known attacks is discussed.

Original languageEnglish
Title of host publicationAssociation for Women in Mathematics Series
Number of pages22
StatePublished - 2017

Publication series

NameAssociation for Women in Mathematics Series
ISSN (Print)2364-5733
ISSN (Electronic)2364-5741

Bibliographical note

Funding Information:
Acknowledgements We would like to thank the organizers of the IPAM workshop on Algebraic Geometry for Coding Theory and Cryptography for inviting us to the event. Thanks also go to Mike O’Sullivan for helpful conversations and to the anonymous referee for kind suggestions. JB was supported by the US Department of Education GAANN Grant P200A120068. HGL was partially supported by the National Science Foundation Grant DMS-1210061 and by the grant #422479 from the Simons Foundation. BM was partially supported by the National Security Agency under grant H98230-16-1-0300. JR was partially supported by the Swiss National Science Foundation under grant #169510.

Publisher Copyright:
© 2017, The Author(s) and the Association for Women in Mathematics.

ASJC Scopus subject areas

  • Mathematics (all)
  • Gender Studies


Dive into the research topics of 'Variations of the McEliece Cryptosystem'. Together they form a unique fingerprint.

Cite this