Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography 2020
DOI: 10.1145/3384940.3388957
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Decryption Failures in Mersenne Number Cryptosystems

Abstract: Mersenne number schemes are a new strain of potentially quantumsafe cryptosystems that use sparse integer arithmetic modulo a Mersenne prime to encrypt messages. Two Mersenne number based schemes were submitted to the NIST post-quantum standardization process: Ramstake and Mersenne-756839. Typically, these schemes admit a low but non-zero probability that ciphertexts fail to decrypt correctly. In this work we show that the information leaked from failing ciphertexts can be used to gain information about the se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Mersenne primes are used in cryptography (see, e.g., [8,[20][21][22][23][24]). But to fix the ideas, only medium-sized Mersenne primes are used in cryptography.…”
Section: Resultsmentioning
confidence: 99%
“…Mersenne primes are used in cryptography (see, e.g., [8,[20][21][22][23][24]). But to fix the ideas, only medium-sized Mersenne primes are used in cryptography.…”
Section: Resultsmentioning
confidence: 99%
“…Mersenne primes are used in cryptography (see, e.g., [31], [1,3,7,18], [32]). But to fix the ideas, only medium-sized Mersenne primes are used in cryptography.…”
Section: Resultsmentioning
confidence: 99%
“…• Mersenne number based schemes typically admit a low probability of decryption failure that can be exploited to gain information about secret keys [63]. • Group-based ciphers have been proposed, however, large expansion of encrypted data [42] and attacks on promising group-based NIST candidates like WalnutDSA [43] make group based knapsack ciphers unsuitable postquantum cryptographic candidates.…”
Section: ) Other Classical Cryptographic Systemsmentioning
confidence: 99%