2018
DOI: 10.1007/978-3-030-00434-7_16
|View full text |Cite
|
Sign up to set email alerts
|

Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes

Abstract: Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are promising post-quantum candidates to replace quantum vulnerable classical alternatives. However, a new type of attacks based on Bob's reactions have recently been introduced and appear to significantly reduce the length of the life of any keypair used in these systems. In this paper we estimate the complexity of all known reaction attacks against QC-LDPC and QC-MDPC code-based variants of the McEliece cryptosystem. We also show how the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Then, in the attack complexity, we can neglect the complexity of the cliques search. The complexity of this attack, which has been extensively studied in [32], can then be estimated as WF FHS + ≥ 2 2n 0 − n (1) − n (2) n 0 ! n (1)…”
Section: Fhs + Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, in the attack complexity, we can neglect the complexity of the cliques search. The complexity of this attack, which has been extensively studied in [32], can then be estimated as WF FHS + ≥ 2 2n 0 − n (1) − n (2) n 0 ! n (1)…”
Section: Fhs + Attackmentioning
confidence: 99%
“…Thus, an opponent can apply an ISD algorithm to search for vectors with weight n 0 d v , denoted as v¯(x) in polynomial notation, such that G(x)v¯T(x) = 0. In particular, some considerations on G′ can be made in order to ease the application of ISD; details on this procedure can be found in [32]. As for the FHS+ attack, unless the DFR of the system is significantly low, we can neglect the complexity of Algorithm 6 ( Fig.…”
Section: Fhz Attackmentioning
confidence: 99%
“…One final remark is about the schemes we consider: as shown in [24], [25], the complexity of algorithm A can be increased with proper choices in the structure of the secret key.…”
Section: A General Framework For Reaction and Timing Attacksmentioning
confidence: 99%
“…Thus, after observing a sufficiently large number of decryption instances, an adversary can exploit the gathered information to reconstruct the secret key, or an equivalent version of it. The reconstruction phase is commonly very efficient, unless some specific choices in the system design are made [24], [25] which, however, may have some significant drawbacks in terms of public key size. All the aforementioned attack techniques are instead prevented if the DFR has negligible values [27] and the algorithm is implemented with constant time.…”
Section: Introductionmentioning
confidence: 99%