Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum cryptography, since they are characterised by compact keys and high algorithmic efficiency. The main issue with this kind of system is represented by the fact that, since the decoding procedure is probabilistic, it may leak information about the secret key. In this work, the authors study cryptanalysis procedures that aim at recovering the secret key by exploiting this fact. They identify the phenomenon that is at the basis of these procedures and show that the QC structure plays an important role in the success of these attacks. They use a graph analogy to study the complexity of these attacks, and show that their feasibility strongly depends on the QC structure. They also devise an approach to perform full cryptanalysis by combining an information set decoding algorithm with some partial knowledge about the structure of the secret key.

Complexity of statistical attacks on QC-LDPC code-based cryptosystems / Santini, Paolo; Baldi, Marco; Chiaraluce, Franco. - In: IET INFORMATION SECURITY. - ISSN 1751-8709. - ELETTRONICO. - 14:3(2020), pp. 304-312. [10.1049/iet-ifs.2019.0420]

Complexity of statistical attacks on QC-LDPC code-based cryptosystems

SANTINI, PAOLO
;
Baldi, Marco;Chiaraluce, Franco
2020-01-01

Abstract

Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum cryptography, since they are characterised by compact keys and high algorithmic efficiency. The main issue with this kind of system is represented by the fact that, since the decoding procedure is probabilistic, it may leak information about the secret key. In this work, the authors study cryptanalysis procedures that aim at recovering the secret key by exploiting this fact. They identify the phenomenon that is at the basis of these procedures and show that the QC structure plays an important role in the success of these attacks. They use a graph analogy to study the complexity of these attacks, and show that their feasibility strongly depends on the QC structure. They also devise an approach to perform full cryptanalysis by combining an information set decoding algorithm with some partial knowledge about the structure of the secret key.
2020
File in questo prodotto:
File Dimensione Formato  
IET Information Security - 2020 - Santini - Complexity of statistical attacks on QC‐LDPC code‐based cryptosystems.pdf

accesso aperto

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza d'uso: Tutti i diritti riservati
Dimensione 1.37 MB
Formato Adobe PDF
1.37 MB Adobe PDF Visualizza/Apri
Graph_analysis_of_reaction_attacks.pdf

accesso aperto

Descrizione: This is the peer reviewed version of the following article: Santini, P., Baldi, M. and Chiaraluce, F. (2020), Complexity of statistical attacks on QC-LDPC code-based cryptosystems. IET Inf. Secur., 14: 304-312. https://doi.org/10.1049/iet-ifs.2019.0420, which has been published in final form at https://doi.org/10.1049/iet-ifs.2019.0420. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. This article may not be enhanced, enriched or otherwise transformed into a derivative work, without express permission from Wiley or by statutory rights under applicable legislation. Copyright notices must not be removed, obscured or modified. The article must be linked to Wiley’s version of record on Wiley Online Library and any embedding, framing or otherwise making available the article or pages thereof by third parties from platforms, services and websites other than Wiley Online Library must be prohibited.
Tipologia: Documento in post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza d'uso: Licenza specifica dell’editore
Dimensione 454.17 kB
Formato Adobe PDF
454.17 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11566/271987
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact