Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes

被引:2
|
作者
Santini, Paolo [1 ]
Baldi, Marco [1 ]
Chiaraluce, Franco [1 ]
机构
[1] Univ Politecn Marche, Ancona, Italy
来源
关键词
Code-based cryptography; McEliece cryptosystem; Niederreiter cryptosystem; Post-quantum cryptography; Quasi-cyclic low-density parity-check codes;
D O I
10.1007/978-3-030-00434-7_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are promising post-quantum candidates to replace quantum-vulnerable classical alternatives. However, a new type of attacks based on Bob's reactions have recently been introduced and appear to significantly reduce the length of the life of any keypair used in these systems. In this paper we estimate the complexity of all known reaction attacks against QC-LDPC and QC-MDPC code-based variants of the McEliece cryptosystem. We also show how the structure of the secret key and, in particular, the secret code rate affect the complexity of these attacks. It follows from our results that QC-LDPC code-based systems can indeed withstand reaction attacks, on condition that some specific decoding algorithms are used and the secret code has a sufficiently high rate.
引用
收藏
页码:323 / 343
页数:21
相关论文
共 50 条
  • [21] Analysis of common attacks in public-key cryptosystems based on low-density parity-check codes
    Skantzos, NS
    Saad, D
    Kabashima, Y
    PHYSICAL REVIEW E, 2003, 68 (05): : 561251 - 561251
  • [22] Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
    Huang H.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (03): : 220 - 226
  • [23] Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
    Carl Löndahl
    Thomas Johansson
    Masoumeh Koochak Shooshtari
    Mahmoud Ahmadian-Attari
    Mohammad Reza Aref
    Designs, Codes and Cryptography, 2016, 80 : 359 - 377
  • [24] Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
    Londahl, Carl
    Johansson, Thomas
    Shooshtari, Masoumeh Koochak
    Ahmadian-Attari, Mahmoud
    Aref, Mohammad Reza
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (02) : 359 - 377
  • [25] A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 14025 - 14042
  • [26] Round5: Compact and Fast Post-quantum Public-Key Encryption
    Baan, Hayo
    Bhattacharya, Sauvik
    Fluhrer, Scott
    Garcia-Morchon, Oscar
    Laarhoven, Thijs
    Rietman, Ronald
    Saarinen, Markku-Juhani O.
    Tolhuizen, Ludo
    Zhang, Zhenfei
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 83 - 102
  • [27] Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices
    Chikouche, Noureddine
    Ghadbane, Abderrahmen
    CHALLENGES AND OPPORTUNITIES IN THE DIGITAL ERA, 2018, 11195 : 67 - 80
  • [28] Securing M2M With Post-Quantum Public-Key Cryptography
    Shih, Jie-Ren
    Hu, Yongbo
    Hsiao, Ming-Chun
    Chen, Ming-Shing
    Shen, Wen-Chung
    Yang, Bo-Yin
    Wu, An-Yeu
    Cheng, Chen-Mou
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2013, 3 (01) : 106 - 116
  • [29] Security of GPT-like public-key cryptosystems based on linear rank codes
    Kshevetskiy, Alexander
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 143 - +
  • [30] Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies
    Eaton, Edward
    Jao, David
    Komlo, Chelsea
    Mokrani, Youcef
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 461 - 482