Post-quantum algorithm of Classic McEliece key encapsulation




public key cryptosystems, cryptosystems based on algebraic codes, post-quantum cryptography, key encapsulation, performance


A comprehensive analysis of a candidate-finalist of the International Post-quantum Cryptography Competition NIST PQC, namely, the Classic McEliece algorithm, the key encapsulation algorithm based on code cryptosystems, is carried out. The aim of this work is a primary study of the basic characteristics of the Classic McEliece algorithm, such as the mathematical model, the expected cryptographic strength and quantitative assessment of the resources.
The paper gives the analysis of the mathematical model of the Classic McEliece algorithm, description of the main functions and transformations, comparison of the primary model of the algorithm proposed by Robert McEliece in 1978 with the considered algorithm, analysis of the modifications made by the authors of Classic McEliece. It also provides recommendations for further areas of research and refinement of the algorithm. As a primary assessment of cryptographic security, an analysis of compliance with modern requirements for post-quantum cryptosystems is carried out, namely, ensuring the property of indistinguishability for attacks based on selected plaintext, indistinguishability for non-adaptive and adaptive attacks based on selected cipher text.
The paper analyzes the memory costs for storing system parameters, evaluating the impact of their size on the system performance. The characteristics of the Classic McEliece algorithm are compared with similar algorithms based on the algebraic codes presented as alternatives at the NIST PQC Competition, namely, the BIKE and HQC algorithms. The performance evaluation is carried out for three basic functions of the algorithm: keys generation, encapsulation and de-encapsulation.


Classic McEliece: conservative code-based cryptography [Электронный ресурс]. Режим доступа:

McEliece R.J. A public-key cryptosystem based on algebraic coding theory // Prog. Rep., Jet Prop. Lab., California Inst. Technol, 1978. P. 114 – 116.

Горбенко І.Д. Прикладна криптологія. Теорія. Практика. Застосування: монографія / І.Д. Горбенко, Ю.І. Горбенко. Харків : Форт, 2012. 870 с.

Есин В.І. Безпека інформаційних систем і технологій / В.І. Есин, О.О. Кузнецов, Л.С. Сорока. Харків : ХНУ ім. В.Н. Каразіна, 2013. 632 с.

Горбенко І. Д. Постквантова криптографія та механізми її реалізації / І. Д. Горбенко, О. О. Кузнєцов, О. В. Потій, Ю. І. Горбенко, Р. С. Ганзя, В. А. Пономар // Радіотехніка. 2016. Вип. 186. С. 32-52.

Гоппa В. Д.. Введение в алгебраическую теорию информации. Москва : Наука, Физматлит, 1995. 112 с.

Post-Quantum Cryptography [Электронный ресурс]. Режим доступа:

Report on Post-Quantum Cryptography [Электронный ресурс].

Daniel J. Bernstein Johannes Buchmann Erik Dahmen. Post-Quantum Cryptography. [Электронный ресурс]. Режим доступа: -Based_ Cryptography/links/540d62d50cf2df04e7549388/Code-Based-Cryptography.pdf.

Menezes J., van Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. Boca Raton, Florida. CRC Press. 1997. 816 р.

Katz, Jonathan; Lindell, Yehuda. Introduction to Modern Cryptography: Principles and Protocols // Chapman and Hall/CRC, 2007. 552 pages.

FIPS PUB 180-4, Secure Hash Standard (SHS) [Электронный ресурс]. Режим доступа:

BIKE: Bit Flipping Key Encapsulation [Электронный ресурс]. Режим доступа:

Hamming Quasi-Cyclic (HQC) [Электронный ресурс]. Режим доступа:

SUPERCOP [Электронный ресурс]. Режим доступа:



How to Cite

Lutsenko, M. (2020). Post-quantum algorithm of Classic McEliece key encapsulation. Radiotekhnika, 4(203), 82–90.




Most read articles by the same author(s)