A Novel Attack to the Permuted Kernel Problem

06/29/2022
by   Paolo Santini, et al.
0

The Permuted Kernel Problem (PKP) asks to find a permutation of a given vector belonging to the kernel of a given matrix. The PKP is at the basis of PKP-DSS, a post-quantum signature scheme deriving from the identification scheme proposed by Shamir in 1989. The most efficient solver for PKP is due to a recent paper by Koussa et al. In this paper we propose an improvement of such an algorithm, which we achieve by considering an additional collision search step applied on kernel equations involving a small number of coordinates. We study the conditions for such equations to exist from a coding theory perspective, and we describe how to efficiently find them with methods borrowed from coding theory, such as information set decoding. We assess the complexity of the resulting algorithm and show that it outperforms previous approaches in several cases. We also show that, taking the new solver into account, the security level of some instances of PKP-DSS turns out to be slightly overestimated.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/02/2022

Improvement of algebraic attacks for solving superdetermined MinRank instances

The MinRank (MR) problem is a computational problem that arises in many ...
research
03/23/2021

Quantum-access security of the Winternitz one-time signature scheme

Quantum-access security, where an attacker is granted superposition acce...
research
04/02/2020

A high capacity text steganography scheme based on permutation and color coding

In this paper, we propose a text steganographic scheme based on color co...
research
09/14/2022

Syndrome decoding meets multiple instances

The NP-hard problem of decoding random linear codes is crucial to both c...
research
04/02/2023

Kernel-level Rootkit Detection, Prevention and Behavior Profiling: A Taxonomy and Survey

One of the most elusive types of malware in recent times that pose signi...
research
08/14/2020

A New Path to Code-based Signatures via Identification Schemes with Restricted Errors

In this paper we introduce a variant of the Syndrome Decoding Problem (S...
research
05/16/2023

Security Enhancement of Quantum Noise Stream Cipher Based on Probabilistic Constellation Shaping

We propose a QNSC pre-coding scheme based on probabilistic shaping of th...

Please sign up or login with your details

Forgot password? Click here to reset