Filters








17 Hits in 4.6 sec

QC-MDPC: A Timing Attack and a CCA2 KEM [chapter]

Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
2018 Lecture Notes in Computer Science  
To our knowledge, this is the first timing attack on a QC-MDPC scheme.  ...  Based on this study, we derive a timing attack.  ...  Finally in Section 5, we show a new construction for a QC-MDPC-based KEM, called ParQ.  ... 
doi:10.1007/978-3-319-79063-3_3 fatcat:q4u3pjeydnemraa562j2522bqm

Implementing QC-MDPC McEliece Encryption

Ingo Von Maurich, Tobias Oder, Tim Güneysu
2015 ACM Transactions on Embedded Computing Systems  
In this article we provide optimized decoding techniques for MDPC codes and survey several efficient implementations of the QC-MDPC McEliece cryptosystem.  ...  A recent proposal by Misoczki et al. showed that quasi-cyclic moderate-density parity-check (QC-MDPC) codes can be used in McEliece encryption -reducing the public key to just 0.6 kByte to achieve an 80  ...  Acknowledgements This work was supported in part by the German Federal Ministry of Economics and Technology (Grant 01ME12025 SecMobil) and the Commission of the European Communities through the Horizon  ... 
doi:10.1145/2700102 fatcat:jrh3wgol2bfmxirnk3amglxxdu

IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter [chapter]

Ingo von Maurich, Lukas Heberle, Tim Güneysu
2016 Lecture Notes in Computer Science  
Compared to the original proposal of using McEliece and Niederreiter with binary Goppa codes, QC-MDPC codes allow much smaller keys and were shown to achieve good performance on a variety of platforms  ...  QC-MDPC McEliece attracted significant attention as promising alternative public-key encryption scheme believed to be resistant against quantum computing attacks.  ...  The authors would like to thank Rafael Misoczki for helpful feedback and comments when starting this project.  ... 
doi:10.1007/978-3-319-29360-8_1 fatcat:ie3tcyndyndh5izf5l67dmldyy

Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography

Bo-Yeon Sim, Jihoon Kwon, Kyu Young Choi, Jihoon Cho, Aesun Park, Dong-Guk Han
2019 Transactions on Cryptographic Hardware and Embedded Systems  
Chou suggested a constant-time implementation for quasi-cyclic moderatedensity parity-check (QC-MDPC) code-based cryptography to mitigate timing attacks at CHES 2016.  ...  Our experiments show that the BIKE and LEDAcrypt may become vulnerable to our proposed attacks.  ...  Acknowledgments The authors would like to thank the anonymous reviewers and the shepherds Diego F. Aranha and Mehdi Tibouchi for their useful comments that improved the quality of the paper.  ... 
doi:10.13154/tches.v2019.i4.180-212 dblp:journals/tches/SimKCCPH19 fatcat:yurx2sk42bdabpnirggnnds4fe

A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems

Alessandro Barenghi, Gerardo Pelosi
2020 Proceedings of the 17th ACM International Conference on Computing Frontiers  
We evaluate advantages and shortcomings of the different inversion algorithms, including their capability to run in constant-time, thus preventing timing side-channel attacks.  ...  Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardization initiative by the U.S.A. National Institute of Standards and Technology (NIST).  ...  The three systems employ a binary QC-MDPC code having a systematic public parity-check matrix representation.  ... 
doi:10.1145/3387902.3397224 dblp:conf/cf/BarenghiP20a fatcat:ws3uct525banxj7q5etwlrqmba

A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke [article]

Qian Guo, Thomas Johansson, Alexander Nilsson
2019 IACR Cryptology ePrint Archive  
In this paper we propose and discuss a generic attack for secret key recovery based on generating decryption errors.  ...  In a standard PKC setting, the model first consists of a precomputation phase where special messages and their corresponding error vectors are generated.  ...  For this setting, Guo, Johansson and Stankovski [13] , proposed a key-recovery attack against the CCA-secure version of QC-MDPC, which is a code-based scheme.  ... 
dblp:journals/iacr/00010N19 fatcat:uer4g2tc3rfvto74ux5i727grq

A Key-Recovery Side-Channel Attack on Classic McEliece [article]

Qian Guo, Andreas Johansson, Thomas Johansson
2022 IACR Cryptology ePrint Archive  
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project.  ...  The attack is fully implemented and evaluated in the Chipwhisperer framework and is successful in practice.  ...  RIT17-0005), and by the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation.  ... 
dblp:journals/iacr/GuoJJ22 fatcat:bebnq5vgzfg2vep3hwb3by4o34

DAGS: Key encapsulation using dyadic GS codes

Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti (+1 others)
2018 Journal of Mathematical Cryptology  
In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.  ...  We believe that DAGS will offer competitive performance, especially when compared with other existing code-based schemes, and represent a valid candidate for post-quantum standardization.  ...  There is a one-to-one correspondence between these roots and the error positions: in fact, there is an error in position i if and only if σ(1/x i ) = 0.  ... 
doi:10.1515/jmc-2018-0027 fatcat:grjhydflwffnrjsv62viehvsmi

Code based Cryptography: Classic McEliece [article]

Harshdeep Singh
2020 arXiv   pre-print
This report elaborates a key encapsulation mechanism (KEM), namely Classic McEliece, based on algebraic coding theory to establish a symmetric key for two users.  ...  This article addresses code-based cryptography and is designed to depict the complete outline of a code based public key cryptosystem.  ...  We say that a KEM is secure under adaptive chosen ciphertext attacks if the advantage Adv KEM of any polynomial time adversary A in the above CCA model is negligible.  ... 
arXiv:1907.12754v2 fatcat:gt4rleeorba6zjtvol6qmwfyle

Post-Quantum Cryptography Algorithms Standardization and Performance Analysis [article]

Manish Kumar
2022 arXiv   pre-print
Quantum computer is no longer a hypothetical idea. It is the worlds most important technology and there is a race among countries to get supremacy in quantum technology.  ...  Its the technology that will reduce the computing time from years to hours or even minutes. The power of quantum computing will be a great support for the scientific community.  ...  It is based on quasi-cyclic moderate density parity-check (QC-MDPC) codes that can be decoded using bit flipping decoding techniques.  ... 
arXiv:2204.02571v1 fatcat:3khslj5ejbafzf27nk6ztywbi4

A Survey on Code-Based Cryptography [article]

Violetta Weger, Niklas Gassner, Joachim Rosenthal
2022 arXiv   pre-print
(KEM) and digital signature schemes.  ...  With this chapter we aim at providing a survey on code-based cryptography, focusing on PKEs and signature schemes.  ...  The second and third author are supported by armasuisse Science and Technology (Project Nr.: CYD C-2020010).  ... 
arXiv:2201.07119v3 fatcat:oo53emg22jdxtmsevemlit7hlm

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan
2021 Cryptography  
This threat triggered post-quantum cryptography research to design and develop post-quantum algorithms that can withstand quantum computing attacks.  ...  arithmetic ciphers could be solved in polynomial time.  ...  Acknowledgments: This research work has been carried out under the leadership of the Institute for Technological Research SystemX, and therefore granted within the scope of the program "Recherche Exploratoire  ... 
doi:10.3390/cryptography5040038 fatcat:wkb43zunwjagbnljc6brfou4ty

Reproducible Codes and Cryptographic Applications [article]

Paolo Santini, Edoardo Persichetti, Marco Baldi
2018 IACR Cryptology ePrint Archive  
Some families of F-reproducible codes have the property that they can be entirely generated from a small number of signature vectors, and consequently admit matrices that can be described in a very compact  ...  We then consider some cryptographic applications of codes of this type and show that their use can be advantageous for hindering some current attacks against cryptosystems relying on structured codes.  ...  Acknowledgements Authors Edoardo Persichetti and Paolo Santini were supported by National Science Foundation (NSF) grant CNS-1906360 Bibliography [1] https://bigquake.inria.fr/. [2] https://csrc.nist.gov  ... 
dblp:journals/iacr/SantiniPB18 fatcat:anm5a4cfuzhlhce3pikidopw7m

Implementing Rlwe-Based Schemes Using An Rsa Co-Processor

Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner
2018 Zenodo  
In particular, we demonstrate an implementation of a variant of the Module-LWE-based Kyber Key Encapsulation Mechanism (KEM) that is tailored for optimal performance on a commercially available smart card  ...  Moreover, we speed-up symmetric operations in our Kyber variant using the AES co-processor to implement a PRNG and a SHA-256 co-processor to realise hash functions.  ...  1,200,351 1,497,789 1,526,564 NewHope-1024 h ARM 1,168,224 1,738,922 298,877 CPA-RLWE-512 i AVR - 1,975,806 553,536 CCA-RLWE-1024 j ARM 2,669,559 4,176,68 4,416,918 Saber k ARM 1,147,000 1,444,000 1,543,000 QC-MDPC  ... 
doi:10.5281/zenodo.1486565 fatcat:vuj3jabg75b3dnqtn72wpv5pwe

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
capable of withstanding quantum computing attacks.  ...  With billions of connected devices spanning continents through interconnected networks, security and privacy protection techniques for the emerging II services become a paramount concern.  ...  [220] dealt with QC-MDPC McEliece implementations on embedded devices (8-bit AVR microcontroller).  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
« Previous Showing results 1 — 15 out of 17 results