Modifications of niederreiter crypto-code construction

Oleksii Tsyhanenko


Studies of the Niederreiter crypto-code construction at MES have revealed the main reason for the impossibility of practical implementation of decoding algorithms with non-binary codes in the classical scheme. It has been established that fixing a subset of plaintexts is required, for which the error localization procedure cannot be performed with masking selected private matrices X, P, and D. The modified algorithm is developed by shortening the source data and fixing the allowable positional plaintext transformation vectors based on equilibrium coding


Niederreiter modified crypto-code construction; modified shortened elliptic codes; equilibrium coding; informational secrecy


Dinh, H., Moore, C., Russell, A. (2019). McEliece and Niederreiter Cryptosystems that Resist Quantum Fourier Sampling Attacks. Heidelberg: Springer-Verlag Berlin, 761–779. Available at: Last accessed: 01.12.2019

Sidelnikov, V. M. (2008). Teoriia kodirovaniia. Moscow: FIZMATLIT, 324.

Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., Aleksiyev, V., Verheles, D., Volkov, S. et. al. (2018). Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes. Eastern-European Journal of Enterprise Technologies, 6 (4 (96)), 24–31. doi:

Cho, J. Y., Griesser, H., Rafique, D. (2017). A McEliece-Based Key Exchange Protocol for Optical Communication Systems. Lecture Notes in Electrical Engineering, 109–123. doi:

Yevseiev, S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (82)), 18–26. doi:

Yevseiev, S., Tsyhanenko, O. (2018). Development of asymmetrical crypto-coded construction of niderraiter on modified codes. Sistemi obrobki іnformacіi, 2 (153), 127–135. doi:

Dudykevych, V. B., Kuznetsov, O. O., Tomashevskyi, B. P. (2010). Krypto-kodovyi zakhyst informatsii z nedviikovym rivnovahovym koduvanniam. Suchasnyi zakhyst informatsii, 2, 14–23.

Dudykevych, V. B., Kuznietsov, O. O., Tomashevskyi, B. P. (2010). Metod nedviikovoho rivnovahovoho koduvannia. Suchasnyi zakhyst informatsii, 3, 57–68.

De Vries, S. (2016). Achieving 128-bit Security againstQuantum Attacks in OpenVPN. Available at: Last accessed: 01.12.2019

Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D. (2014). Enhanced public key security for the McEliece cryptosystem. Available at: Last accessed: 01.12.2019

Yevseiev, S., Tsyhanenko, O., Gavrilova, A., Guzhva, V., Milov, O., Moskalenko, V. et. al. (2019). Development of Niederreiter hybrid crypto-code structure on flawed codes. Eastern-European Journal of Enterprise Technologies, 1 (9 (97)), 27–38. doi:

Yevseiev, S., Shmatko, O., Tsyhanenko, O. (2019). Metodologicheskiye osnovy postroyeniya kriptostoykikh kriptosistem Mak-Elisa i Niderraytera na algebrogeometricheskikh kodakh v postkvantovoy kriptografii. 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies. Ankara.

GOST Style Citations

Copyright (c) 2019

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN 2313-8416 (Online), ISSN 2313-6286 (Print)