2018
DOI: 10.46586/tches.v2019.i1.238-258
|View full text |Cite
|
Sign up to set email alerts
|

Error Amplification in Code-based Cryptography

Abstract: Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have been derived. These schemes rely on iterative decoding in the decryption process and thus have a certain small probability p of having a decryption (decoding) error.In this paper we show a very fundamental and important property of code-based encryption schemes. Given one initial error pattern that fails to decode… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…success or failure), the required time for decoding, the power consumption of some particular step, etc. (see [14,15,[17][18][19]25] for some concrete possibilities). The adversary first collects all the oracle replies, and then performs a statistical analysis on them, with the aim of guessing some information about the secret key.…”
Section: Gsa Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…success or failure), the required time for decoding, the power consumption of some particular step, etc. (see [14,15,[17][18][19]25] for some concrete possibilities). The adversary first collects all the oracle replies, and then performs a statistical analysis on them, with the aim of guessing some information about the secret key.…”
Section: Gsa Attackmentioning
confidence: 99%
“…Such a probabilistic nature of decoding has been shown to leak some information about the secret key. The first-ever published attack of this kind, which is due to Guo et al [14], exploits events of decoding failure to recover the secret key; after that, the same attack procedure has been extended, in order to consider different schemes and other kinds of information leakage [15][16][17][18][19]. Essentially, all these attacks can be divided into two common phases.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper we focus on systems with security against a Chosen Ciphertext Attack (CCA), that is, the case in which a proper conversion (like the one of [16]) is applied to the McEliece/Niederreiter cryptosystem, in order to achieve CCA security. In our attack model, this corresponds to assuming that the oracle queries are all randomly generated, i.e., the error vectors used during encryption can be seen as randomly picked elements from the ensemble of all n-uples with weight t. Opposed to the CCA case, in the Chosen Plaintext Attack (CPA) case the opponent is free to choose the error vectors used during encryption: from the adversary standpoint, the CPA assumption is clearly more optimistic than that of CCA, and leads to improvements in the attack [15], [21]. Obviously, all results we discuss in this paper can be extended to the CPA case.…”
Section: A General Framework For Reaction and Timing Attacksmentioning
confidence: 99%
“…Such a feature is crucial, since it has been shown how this probabilistic nature of the decoder actually exposes the system to cryptanalysis techniques based on the observation of the decryption phase. State-of-the-art attacks of this kind are commonly called reaction attacks, when based on decoding failures events [12], [13], [15], [22], or side-channel attacks, when based on information such as the duration of the decoding phase (in this case we speak properly of timing attacks) or other quantities [10], [11], [21]. All these previous techniques exploit the QC structure of the code and aim at recovering some characteristics of the secret key by performing a statistical analysis on a sufficiently large amount of collected data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation