Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes

被引:2
|
作者
Santini, Paolo [1 ]
Baldi, Marco [1 ]
Chiaraluce, Franco [1 ]
机构
[1] Univ Politecn Marche, Ancona, Italy
来源
关键词
Code-based cryptography; McEliece cryptosystem; Niederreiter cryptosystem; Post-quantum cryptography; Quasi-cyclic low-density parity-check codes;
D O I
10.1007/978-3-030-00434-7_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are promising post-quantum candidates to replace quantum-vulnerable classical alternatives. However, a new type of attacks based on Bob's reactions have recently been introduced and appear to significantly reduce the length of the life of any keypair used in these systems. In this paper we estimate the complexity of all known reaction attacks against QC-LDPC and QC-MDPC code-based variants of the McEliece cryptosystem. We also show how the structure of the secret key and, in particular, the secret code rate affect the complexity of these attacks. It follows from our results that QC-LDPC code-based systems can indeed withstand reaction attacks, on condition that some specific decoding algorithms are used and the secret code has a sufficiently high rate.
引用
收藏
页码:323 / 343
页数:21
相关论文
共 50 条
  • [1] LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes
    Baldi, Marco
    Barenghi, Alessandro
    Chiaraluce, Franco
    Pelosi, Gerardo
    Santini, Paolo
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 3 - 24
  • [2] Code-Based Public-Key Cryptosystems for the Post-Quantum Period
    Kuznetsov, Alexandr
    Svatovskij, Igor
    Kiyan, Nastya
    Pushkar'ov, Andriy
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 125 - 130
  • [3] A Modified McEliece Public-Key Cryptosystem Based On Irregular Codes Of QC-LDPC And QC-MDPC
    Hashemi, Seyed Hesam Odin
    Hodtani, Ghosheh Abed
    2019 27TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2019), 2019, : 1373 - 1376
  • [4] Reaction attacks against several public-key cryptosystems
    Hall, C
    Goldberg, I
    Schneier, B
    INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 2 - 12
  • [5] A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting
    Wang, Luping
    Chen, Jie
    Zhang, Kai
    Qian, Haifeng
    THEORETICAL COMPUTER SCIENCE, 2020, 835 : 82 - 96
  • [6] Complexity of statistical attacks on QC-LDPC code-based cryptosystems
    Santini, Paolo
    Baldi, Marco
    Chiaraluce, Franco
    IET INFORMATION SECURITY, 2020, 14 (03) : 304 - 312
  • [7] Key Reuse Attacks on Post-quantum Cryptosystems, Revisited
    Wang, Ke
    Zhang, Zhenfeng
    Jiang, Haodong
    Xie, Huiqin
    Li, Yanjun
    Sun, Ying
    Han, Lidong
    COMPUTER JOURNAL, 2024, 67 (01): : 323 - 337
  • [8] Cryptanalysis of a Public Key Encryption Scheme Based on QC-LDPC and QC-MDPC Codes
    Dragoi, Vlad
    Kalachi, Herve Tale
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (02) : 264 - 267
  • [9] Security and reliability of LDPC based public-key cryptosystems
    Saad, D
    Skantzos, NS
    Kabashima, Y
    PROGRESS OF THEORETICAL PHYSICS SUPPLEMENT, 2005, (157): : 229 - 236
  • [10] IMMUNIZING PUBLIC-KEY CRYPTOSYSTEMS AGAINST CHOSEN CIPHERTEXT ATTACKS
    ZHENG, YL
    SEBERRY, J
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 715 - 724