Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum cryptography, since they are characterised by compact keys and high algorithmic efficiency. The main issue with this kind of system is represented by the fact that, since the decoding procedure is probabilistic, it may leak information about the secret key. In this work, the authors study cryptanalysis procedures that aim at recovering the secret key by exploiting this fact. They identify the phenomenon that is at the basis of these procedures and show that the QC structure plays an important role in the success of these attacks. They use a graph analogy to study the complexity of these attacks, and show that their feasibility strongly depends on the QC structure. They also devise an approach to perform full cryptanalysis by combining an information set decoding algorithm with some partial knowledge about the structure of the secret key.
Complexity of statistical attacks on QC-LDPC code-based cryptosystems / Santini, Paolo; Baldi, Marco; Chiaraluce, Franco. - In: IET INFORMATION SECURITY. - ISSN 1751-8709. - ELETTRONICO. - 14:3(2020), pp. 304-312. [10.1049/iet-ifs.2019.0420]
Complexity of statistical attacks on QC-LDPC code-based cryptosystems
SANTINI, PAOLO
;Baldi, Marco;Chiaraluce, Franco
2020-01-01
Abstract
Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum cryptography, since they are characterised by compact keys and high algorithmic efficiency. The main issue with this kind of system is represented by the fact that, since the decoding procedure is probabilistic, it may leak information about the secret key. In this work, the authors study cryptanalysis procedures that aim at recovering the secret key by exploiting this fact. They identify the phenomenon that is at the basis of these procedures and show that the QC structure plays an important role in the success of these attacks. They use a graph analogy to study the complexity of these attacks, and show that their feasibility strongly depends on the QC structure. They also devise an approach to perform full cryptanalysis by combining an information set decoding algorithm with some partial knowledge about the structure of the secret key.File | Dimensione | Formato | |
---|---|---|---|
IET Information Security - 2020 - Santini - Complexity of statistical attacks on QC‐LDPC code‐based cryptosystems.pdf
accesso aperto
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza d'uso:
Tutti i diritti riservati
Dimensione
1.37 MB
Formato
Adobe PDF
|
1.37 MB | Adobe PDF | Visualizza/Apri |
Graph_analysis_of_reaction_attacks.pdf
accesso aperto
Descrizione: This is the peer reviewed version of the following article: Santini, P., Baldi, M. and Chiaraluce, F. (2020), Complexity of statistical attacks on QC-LDPC code-based cryptosystems. IET Inf. Secur., 14: 304-312. https://doi.org/10.1049/iet-ifs.2019.0420, which has been published in final form at https://doi.org/10.1049/iet-ifs.2019.0420. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. This article may not be enhanced, enriched or otherwise transformed into a derivative work, without express permission from Wiley or by statutory rights under applicable legislation. Copyright notices must not be removed, obscured or modified. The article must be linked to Wiley’s version of record on Wiley Online Library and any embedding, framing or otherwise making available the article or pages thereof by third parties from platforms, services and websites other than Wiley Online Library must be prohibited.
Tipologia:
Documento in post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza d'uso:
Licenza specifica dell’editore
Dimensione
454.17 kB
Formato
Adobe PDF
|
454.17 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.