Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes

被引:2
|
作者
Santini, Paolo [1 ]
Baldi, Marco [1 ]
Chiaraluce, Franco [1 ]
机构
[1] Univ Politecn Marche, Ancona, Italy
来源
关键词
Code-based cryptography; McEliece cryptosystem; Niederreiter cryptosystem; Post-quantum cryptography; Quasi-cyclic low-density parity-check codes;
D O I
10.1007/978-3-030-00434-7_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are promising post-quantum candidates to replace quantum-vulnerable classical alternatives. However, a new type of attacks based on Bob's reactions have recently been introduced and appear to significantly reduce the length of the life of any keypair used in these systems. In this paper we estimate the complexity of all known reaction attacks against QC-LDPC and QC-MDPC code-based variants of the McEliece cryptosystem. We also show how the structure of the secret key and, in particular, the secret code rate affect the complexity of these attacks. It follows from our results that QC-LDPC code-based systems can indeed withstand reaction attacks, on condition that some specific decoding algorithms are used and the secret code has a sufficiently high rate.
引用
收藏
页码:323 / 343
页数:21
相关论文
共 50 条
  • [41] Algebraic Supports and New Forms of the Hidden Discrete Logarithm Problem for Post-quantum Public-key Cryptoschemes
    Moldovyan, Dmitriy
    Al-Majmar, Nashwan
    Moldovyan, Alexander
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (03) : 372 - 379
  • [42] Analysis of Reaction and Timing Attacks Against Cryptosystems Based on Sparse Parity-Check Codes
    Santini, Paolo
    Battaglioni, Massimo
    Chiaraluce, Franco
    Baldi, Marco
    CODE-BASED CRYPTOGRAPHY, CBC 2019, 2019, 11666 : 115 - 136
  • [43] Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query
    Jiang, Haodong
    Ma, Zhi
    Zhang, Zhenfeng
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT IV, 2023, 14441 : 434 - 468
  • [44] A new code-based public-key cryptosystem resistant to quantum computer attacks
    Egorova, Elena
    Kabatiansky, G.
    Krouk, E.
    Tavernier, C.
    INTERNATIONAL CONFERENCE ON COMPUTER SIMULATION IN PHYSICS AND BEYOND, 2019, 1163
  • [45] SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes
    Guo, Qian
    Nabokov, Denis
    Nilsson, Alexander
    Johansson, Thomas
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT IV, 2023, 14441 : 203 - 236
  • [46] Algorithm-Based Countermeasures against Power Analysis Attacks for Public-key Cryptography SM2
    Han, Xiaowei
    Wang, Beibei
    Wang, An
    Wu, Liji
    Rhee, Woogeun
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 435 - 439
  • [47] Post-quantum public key-agreement scheme based on a new form of the hidden logarithm problem
    Moldovyan, D. N.
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (01) : 56 - 72
  • [48] Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles
    Amirkhanova, Dana Sairangazhykyzy
    Iavich, Maksim
    Mamyrbayev, Orken
    CRYPTOGRAPHY, 2024, 8 (03)
  • [50] 1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography
    Kundu, Nibedita
    Debnath, Sumit Kumar
    Mishra, Dheerendra
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2020, 45 (01):