Assessing and countering reaction attacks against post-quantum public-key cryptosystems based on QC-LDPC codes

08/06/2018
by   Paolo Santini, et al.
0

Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are promising post-quantum candidates to replace quantum vulnerable classical alternatives. However, a new type of attacks based on Bob's reactions have recently been introduced and appear to significantly reduce the length of the life of any keypair used in these systems. In this paper we estimate the complexity of all known reaction attacks against QC-LDPC and QC-MDPC code-based variants of the McEliece cryptosystem. We also show how the structure of the secret key and, in particular, the secret code rate affect the complexity of these attacks. It follows from our results that QC-LDPC code-based systems can indeed withstand reaction attacks, on condition that some specific decoding algorithms are used and the secret code has a sufficiently high rate.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/12/2018

McNie: A code-based public-key cryptosystem

In this paper, we suggest a code-based public key encryption scheme, cal...
research
05/12/2018

Hindering reaction attacks by using monomial codes in the McEliece cryptosystem

In this paper we study recent reaction attacks against QC-LDPC and QC-MD...
research
01/26/2018

LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes

This work presents a new code-based key encapsulation mechanism (KEM) ca...
research
12/20/2017

PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes

Polar codes are novel and efficient error correcting codes with low enco...
research
10/28/2020

On the Failure of the Smart Approach of the GPT Cryptosystem

This paper describes a new algorithm for breaking the smart approach of ...
research
06/11/2020

Combinatorics with Copula for Code based Post-Quantum Cryptography

Codes have been proposed as useful tools in designing cryptosystem that ...
research
03/23/2020

Backflash Light as a Security Vulnerability in Quantum Key Distribution Systems

Based on the fundamental rules of quantum mechanics, two communicating p...

Please sign up or login with your details

Forgot password? Click here to reset