×

Simple power analysis attack on the QC-LDPC McEliece cryptosystem. (English) Zbl 1436.94059

Summary: It is known that a naive implementation of the decryption algorithm in the McEliece cryptosystem allows an attacker to recover the secret matrix \(P\) by measuring the power consumption. We demonstrate that a similar threat is present in the QC-LDPC variant of the McEliece cryptosystem. We consider a naive implementation of the decryption algorithm in the QC-LDPC McEliece cryptosystem. We demonstrate that this implementation leaks information about positions of ones in the secret matrix \(Q\). We argue that this leakage allows an attacker to completely recover the matrix \(Q\). In addition, we note that the quasi-cyclic nature of the matrix \(Q\) allows to accelerate the attack significantly.

MSC:

94A60 Cryptography

Software:

McEliece
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] KOOCHAK SHOOSHTARI, Cryptanalysis of McEliece cryptosystem variants based on quasi - cyclic low - density parity check codes, IET Information Security 10 pp 194– (2016) · doi:10.1049/iet-ifs.2015.0064
[2] REPKA, Overview of the McEliece cryptosystem and its security Tatra Mt pp, Math Publ pp 57– (2014)
[3] HEYSE, Practical power analysis attacks on software implementations of McEliece in Post - Quantum Cryptography ed Lecture Notes in Springer Verlag pp, Math pp 6061– (2010)
[4] MISOCZKI, MDPC - McEliece : new McEliece variants from moderate density parity - check codes in IEEE Internat on Information Theory ISIT Istanbul pp, Symp 13 pp 2069– (2013)
[5] OTMANI, Cryptanalysis of two McEliece cryptosystems based on quasi - cyclic codes in The st Internat on Symbolic Computation and Cryptography Beijing China Math no, Conf Comput Sci 1 pp 129– (2008)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.