Post-quantum encryption and decryption method using linear codes
Patent number:
No items found.
An asymmetric cryptosystem has been developed, presented through a key encapsulation mechanism and inspired by the McEliece cryptosystem. The invention consists of three parts: private and public key generation, encryption, and decryption. A new family of error-correcting codes with efficient decoding algorithms is provided, significantly increasing the search space in this encryption scheme.
Countries:
Spain
Regions:
Andalusia
Centers:
UNIVERSIDAD DE GRANADA
Other entities:
Sectors:
Telecom
Subsectors:
Telecommunications
TRL Level:
TRL 2 – technology concept formulated
BRL Level:
PDF Link:
Download hereVideo Link:
Watch it hereSustainable Development Goal:
Applications
• Invulnerability to Shor's algorithm. Algorithm capable of decrypting, among others, the RSA public key cryptosystem, the most widely used today. • Increased search space. Thanks to the contribution of a new family of larger error correcting codes, with efficient decoding algorithms.
Comments
Other related patents
Telecom
METHOD AND DEVICE FOR EFFICIENTLY UPDATING DATA IN ELECTRONIC DEVICES
Telecom
SYSTEM AND METHOD FOR SECURE, CONTROLLED, ORDERLY AND COLLABORATIVE ACCESS TO SE-CURE DATA NETWORKS
Telecom
Other
Energy



.jpg)