Abstract

Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems has been challenged many times, although some of the variants have remained secure. However, recent studies on code-based cryptography have focused on the side-channel resistance since previous studies have indicated that the existing algorithms were vulnerable to side-channel analysis. In this paper, we propose the first side-channel attack on the Hybrid McEliece Scheme (HyMES) using only a single power consumption trace. HyMES is a variant of the McEliece system that provides smaller keys, along with faster encryption and decryption speed. By exploiting joint distributions of nonlinear functions in the decryption process, we were able to recover the private key of HyMES. To the best of our knowledge, this is the first work proposing a side-channel analysis based on a joint distribution of the leakages on the public-key system.

Highlights

  • Main public-key cryptosystems in use (such as Rivest–Shamir–Adleman (RSA)and elliptic-curve cryptography (ECC)) are based on the difficulty of number theoretic problems.For example, RSA is based on the difficulty of factoring large numbers, while ECC is based on the difficulty of solving discrete logarithm problems on elliptic curves

  • We propose the first side-channel analysis on Hybrid McEliece Scheme (HyMES) using the joint distributions of leakages

  • We introduce the basic concepts in code-based cryptography and structures of HyMES

Read more

Summary

Introduction

Main public-key cryptosystems in use (such as Rivest–Shamir–Adleman (RSA). The public key size of McEliece base on the Goppa code is about 437KB for 80-bit security [5]. The side-channel analysis proposed by Kocher et al is an attack based on information gained from the implementation rather than from the algorithm itself [10,11]. In 2010, Heyse et al proposed the SPA (Simple Power Analysis) on McEliece [9] Their attack involved analyzing the power consumption trace obtained during the decoding process. We present our proposed side-channel analysis on HyMES using a single power consumption trace. The proposed method only uses one power consumption trace, and it is the first joint distribution based analysis for public-key cryptography.

Related Works
Binary Goppa Code
Code-Based Cryptography
McEliece Cryptosystem
5: Represent the m as a message M
Side-Channel Analysis by Exploiting Joint Distributions of Leakages
Single Trace Analysis Against HyMES
Outline of the Proposed Attack
Recovering Lsec
Experiment
Find α0
Experiments Using Multiple Traces
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.