Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems
- URL: http://arxiv.org/abs/2409.16018v2
- Date: Tue, 15 Oct 2024 12:59:58 GMT
- Title: Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems
- Authors: Anna-Lena Horlemann, Karan Khathuria, Marc Newman, Amin Sakzad, Carlos Vela Cabello,
- Abstract summary: Post-quantum cryptography has gained attention due to the need for secure cryptographic systems in the face of quantum computing.
We consider a generic Lee metric based McEliece type cryptosystem and evaluate its security against lattice-based attacks.
- Score: 3.277820036565198
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Post-quantum cryptography has gained attention due to the need for secure cryptographic systems in the face of quantum computing. Code-based and lattice-based cryptography are two prominent approaches, both heavily studied within the NIST standardization project. Code-based cryptography -- most prominently exemplified by the McEliece cryptosystem -- is based on the hardness of decoding random linear error-correcting codes. Despite the McEliece cryptosystem having been unbroken for several decades, it suffers from large key sizes, which has led to exploring variants using metrics than the Hamming metric, such as the Lee metric. This alternative metric may allow for smaller key sizes, but requires further analysis for potential vulnerabilities to lattice-based attack techniques. In this paper, we consider a generic Lee metric based McEliece type cryptosystem and evaluate its security against lattice-based attacks.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Applications of Post-quantum Cryptography [0.0]
The review employs a systematic scoping review with the scope restricted to the years 2022 and 2023.
The review examined the articles on the applications of quantum computing in various spheres.
The paper is analyzing various PQC algorithms, including lattice-based, hash-based, code-based, and isogeny-based cryptography.
arXiv Detail & Related papers (2024-06-19T06:45:39Z) - Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era [0.0]
Post-quantum cryptography (PQC) is a critical field aimed at developing resilient cryptographic algorithms to quantum attacks.
This paper delineates the vulnerabilities of classical cryptographic systems to quantum attacks, elucidates impervious principles of quantum computing, and introduces various PQC algorithms.
arXiv Detail & Related papers (2024-03-18T12:51:56Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes [84.0257274213152]
We propose a new technique to provide accurate estimates of the DFR of a two-iterations (parallel) bit flipping decoder.
We validate our results, providing comparisons of the modeled and simulated weight of the syndrome, incorrectly-guessed error bit distribution at the end of the first iteration, and two-itcrypteration Decoding Failure Rates (DFR)
arXiv Detail & Related papers (2024-01-30T11:40:24Z) - A tiny public key scheme based on Niederreiter Cryptosystem [1.1633929083694385]
This article proposes a code-based public key cryptography scheme that is both simple and implementable.
The key length for the primary parameters of the McEliece cryptosystem ranges from 18 to 500 bits.
The security of this system is at least as strong as the security of the Niederreiter cryptosystem.
arXiv Detail & Related papers (2023-10-10T15:50:18Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - A Survey on Code-Based Cryptography [0.40964539027092917]
A capable quantum computer can break all currently employed asymmetric cryptosystems.
NIST has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-encapsulation mechanisms (KEM) and digital signature schemes.
In 2023, NIST made an additional call for post-quantum signatures.
arXiv Detail & Related papers (2022-01-18T16:46:42Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.