Engineering Research Publication
In this paper, the authors give a technique for secure communication in the presence of third parties. The McEliece cryptosystem is an asymmetric encryption algorithm. It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance in the cryptographic community, but is a candidate for 'Post-quantum cryptography', as it is immune to attacks using Shor's algorithm and more generally measuring coset states using Fourier sampling. More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation.