Security Assessment of the LG Cryptosystem
- URL: http://arxiv.org/abs/2404.06815v1
- Date: Wed, 10 Apr 2024 08:02:18 GMT
- Title: Security Assessment of the LG Cryptosystem
- Authors: Étienne Burle, Hervé Talé Kalachi, Freddy Lende Metouke, Ayoub Otmani,
- Abstract summary: The LG cryptosystem is a public-key encryption scheme in the rank metric using the recent family of $lambdav-$Gabidulin codes.
We present a cryptanalysis showing that the security of several parameters of the scheme have been overestimated.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The LG cryptosystem is a public-key encryption scheme in the rank metric using the recent family of $\lambdav-$Gabidulin codes and introduced in 2019 by Lau and Tan. In this paper, we present a cryptanalysis showing that the security of several parameters of the scheme have been overestimated. We also show the existence of some weak keys allowing an attacker to find in polynomial time an alternative private key.
Related papers
- Unidirectional Key Update in Updatable Encryption, Revisited [0.0]
We construct a new efficient updatable encryption scheme based on FrodoPKE learning with errors key encapsulation.
We analyse the security of the proposed scheme in the backward-leak uni-directional setting within the rand-ind-eu-cpa model.
arXiv Detail & Related papers (2024-10-04T22:16:20Z) - Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems [3.277820036565198]
Post-quantum cryptography has gained attention due to the need for secure cryptographic systems in the face of quantum computing.
We consider a generic Lee metric based McEliece type cryptosystem and evaluate its security against lattice-based attacks.
arXiv Detail & Related papers (2024-09-24T12:21:33Z) - CodeChameleon: Personalized Encryption Framework for Jailbreaking Large
Language Models [49.60006012946767]
We propose CodeChameleon, a novel jailbreak framework based on personalized encryption tactics.
We conduct extensive experiments on 7 Large Language Models, achieving state-of-the-art average Attack Success Rate (ASR)
Remarkably, our method achieves an 86.6% ASR on GPT-4-1106.
arXiv Detail & Related papers (2024-02-26T16:35:59Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Lightweight Public Key Encryption in Post-Quantum Computing Era [0.0]
Confidentiality in our digital world is based on the security of cryptographic algorithms.
In the course of technological progress with quantum computers, the protective function of common encryption algorithms is threatened.
Our concept describes the transformation of a classical asymmetric encryption method to a modern complexity class.
arXiv Detail & Related papers (2023-11-24T21:06:42Z) - A tiny public key scheme based on Niederreiter Cryptosystem [1.1633929083694385]
This article proposes a code-based public key cryptography scheme that is both simple and implementable.
The key length for the primary parameters of the McEliece cryptosystem ranges from 18 to 500 bits.
The security of this system is at least as strong as the security of the Niederreiter cryptosystem.
arXiv Detail & Related papers (2023-10-10T15:50:18Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - A Survey on Code-Based Cryptography [0.40964539027092917]
A capable quantum computer can break all currently employed asymmetric cryptosystems.
NIST has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-encapsulation mechanisms (KEM) and digital signature schemes.
In 2023, NIST made an additional call for post-quantum signatures.
arXiv Detail & Related papers (2022-01-18T16:46:42Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.