2013
DOI: 10.1007/978-3-642-38616-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems

Abstract: Abstract. In this work we present the first practical key-aimed timing attack against code-based cryptosystems. It arises from vulnerabilities that are present in the inversion of the error syndrome through the Extended Euclidean Algorithm that is part of the decryption operation of these schemes. Three types of timing vulnerabilities are combined to a successful attack. Each is used to gain information about the secret support, which is part of code-based decryption keys: The first allows recovery of the zero… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(28 citation statements)
references
References 16 publications
(27 reference statements)
0
26
0
Order By: Relevance
“…This type of attack was already published in [16,18]. The two steps using the EEA are considered as independent parts.…”
Section: Identification Of a Leakagementioning
confidence: 99%
See 4 more Smart Citations
“…This type of attack was already published in [16,18]. The two steps using the EEA are considered as independent parts.…”
Section: Identification Of a Leakagementioning
confidence: 99%
“…In fact, the main problem of previous attacks is the limited number of cases that can be exploited. They just can be applied on wt(e) ∈ {2, 4} as shown in [16] or wt(e) ∈ {2, 4, 6} as presented in [18].…”
Section: Identification Of a Leakagementioning
confidence: 99%
See 3 more Smart Citations