2019
DOI: 10.1109/tit.2018.2877458
|View full text |Cite
|
Sign up to set email alerts
|

A Key Recovery Reaction Attack on QC-MDPC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…We list the basic key reconstruction algorithm from [GJS16] in Algorithm 13 for completeness. The advanced version that is capable of recovering keys from distance spectrum with errors is proposed in [GJW19].…”
Section: The Gjs Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…We list the basic key reconstruction algorithm from [GJS16] in Algorithm 13 for completeness. The advanced version that is capable of recovering keys from distance spectrum with errors is proposed in [GJW19].…”
Section: The Gjs Attackmentioning
confidence: 99%
“…7. The secret key can be recovered via the reconstruction method in [GJS16] or the improved reconstruction method in its extended version [GJW19] that can handle errors in the recovered distance spectrum.…”
Section: Determine If M ?mentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, whenever an attacker may gain access to a decryption oracle to which he may pose a large amount of queries, the so-called reaction attack becomes applicable. Reaction attacks recover the secret key by exploiting the inherent non-zero DFR of QC-LDPC codes [9,10,17]. In particular, these attacks exploit the correlation between the DFR of the code, the positions of the parity checks in the private matrix, and the erroneous positions in the error vector.…”
Section: Reaction Attacksmentioning
confidence: 99%
“…Therefore, in the loop body the value of m is assumed asd v dv(line 13) and subsequently checked to derive the mentioned partition in n 0 integers. The loop (lines 11-15) ends when either a valid partition of m is found or m turns out to be smaller than the number of blocks n 0 (as finding a partition in this case would be not possible increasing only the value of d v ).Algorithm 3 proceeds to test for the security of the cryptosystem against key recovery attacks and key enumeration attacks on both classical and quantum computers (lines[16][17][18]. If a legitimate value for m has not been found, the current parameters of the cryptoystem are deemed insecure (line 20).…”
mentioning
confidence: 99%