Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
نویسندگان
چکیده
Recently, Ivanov et al. proposed a new approach to construct code-based cryptosystems, namely the $ {\sf IKKR} public-key encryptions (PKE) in International Workshop on Code-Based Cryptography (CBCrypto 2020) [9]. Unlike usual construction encryption schemes which has restrictions Hamming weight of error introduced into ciphertext, allows vectors arbitrary being ciphertext. Using this approach, constructed two modified and upgraded $-PKE. This paper aims discuss practical security In particular, we describe weaknesses design public key used We exploit such propose attacks recover plaintext The our first attack is similar LCKN [12], whilst second more efficient than attack. Our experimental results show that can from given ciphertext less 176 milliseconds for based random Goppa codes BCH codes.
منابع مشابه
Attacks to polynomial cryptosystems
In this paper we review some possible attacks to cryptosystems based on the problem of multivariate quadratic equations (MQ). After introducing the MQ problem and sketching schemes to generate private and public keys for these cryptosystems, we present well-known attacks based attacks based on the Gröbner bases computation to solve multivariate systems. The MQ problem The MQ problem consists in...
متن کاملA Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
We investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties. In particular, the MQQ-SIG signature scheme is the fastest scheme in the ECRYPT benchmarking of cryptographic systems (eBACS). We show that both the signature scheme MQQ-SIG and the encryption scheme MQQ-ENC, a...
متن کاملPlaintext-Recovery Attacks Against Datagram TLS
The Datagram Transport Layer Security (DTLS) protocol provides confidentiality and integrity of data exchanged between a client and a server. We describe an efficient and full plaintext recovery attack against the OpenSSL implementation of DTLS, and a partial plaintext recovery attack against the GnuTLS implementation of DTLS. The attack against the OpenSSL implementation is a variant of Vauden...
متن کاملTiming Attacks against the Syndrome Inversion in Code-Based Cryptosystems
In this work we present new timing vulnerabilities that arise in the inversion of the error syndrome through the Extended Euclidean Algorithm that is part of the decryption operation of code-based Cryptosystems. We analyze three types of timing attack vulnerabilities theoretically and experimentally: The first allows recovery of the zero-element of the secret support, the second is a refinement...
متن کاملPlaintext Recovery Attacks Against WPA/TKIP
We conduct an analysis of the RC4 algorithm as it is used in the IEEE WPA/TKIP wireless standard. In that standard, RC4 keys are computed on a per-frame basis, with specific key bytes being set to known values that depend on 2 bytes of the WPA frame counter (called the TSC). We observe very large, TSC-dependent biases in the RC4 keystream when the algorithm is keyed according to the WPA specifi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Mathematics of Communications
سال: 2023
ISSN: ['1930-5346', '1930-5338']
DOI: https://doi.org/10.3934/amc.2020132