Security

How to Implement the Public Key Operations in Code-Based Cryptography on Memory-Constrained Devices

Date Added: Sep 2010
Format: PDF

While it is generally believed that due to their large public key sizes code based public key schemes cannot be conveniently used when memory-constrained devices are involved, the authors propose an approach for Public Key Infrastructure (PKI) scenarios which totally eliminates the need to store public keys of communication partners. Instead, all the necessary computation steps are performed during the transmission of the key. They show the feasibility of the approach for a concrete example platform and analyze a number of code-based cryptographic schemes with respect to its applicability.