Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems

نویسندگان

چکیده

Recently, Ivanov et al. proposed a new approach to construct code-based cryptosystems, namely the $ {\sf IKKR} public-key encryptions (PKE) in International Workshop on Code-Based Cryptography (CBCrypto 2020) [9]. Unlike usual construction encryption schemes which has restrictions Hamming weight of error introduced into ciphertext, allows vectors arbitrary being ciphertext. Using this approach, constructed two modified and upgraded $-PKE. This paper aims discuss practical security In particular, we describe weaknesses design public key used We exploit such propose attacks recover plaintext The our first attack is similar LCKN [12], whilst second more efficient than attack. Our experimental results show that can from given ciphertext less 176 milliseconds for based random Goppa codes BCH codes.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacks to polynomial cryptosystems

In this paper we review some possible attacks to cryptosystems based on the problem of multivariate quadratic equations (MQ). After introducing the MQ problem and sketching schemes to generate private and public keys for these cryptosystems, we present well-known attacks based attacks based on the Gröbner bases computation to solve multivariate systems. The MQ problem The MQ problem consists in...

متن کامل

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems

We investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties. In particular, the MQQ-SIG signature scheme is the fastest scheme in the ECRYPT benchmarking of cryptographic systems (eBACS). We show that both the signature scheme MQQ-SIG and the encryption scheme MQQ-ENC, a...

متن کامل

Plaintext-Recovery Attacks Against Datagram TLS

The Datagram Transport Layer Security (DTLS) protocol provides confidentiality and integrity of data exchanged between a client and a server. We describe an efficient and full plaintext recovery attack against the OpenSSL implementation of DTLS, and a partial plaintext recovery attack against the GnuTLS implementation of DTLS. The attack against the OpenSSL implementation is a variant of Vauden...

متن کامل

Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems

In this work we present new timing vulnerabilities that arise in the inversion of the error syndrome through the Extended Euclidean Algorithm that is part of the decryption operation of code-based Cryptosystems. We analyze three types of timing attack vulnerabilities theoretically and experimentally: The first allows recovery of the zero-element of the secret support, the second is a refinement...

متن کامل

Plaintext Recovery Attacks Against WPA/TKIP

We conduct an analysis of the RC4 algorithm as it is used in the IEEE WPA/TKIP wireless standard. In that standard, RC4 keys are computed on a per-frame basis, with specific key bytes being set to known values that depend on 2 bytes of the WPA frame counter (called the TSC). We observe very large, TSC-dependent biases in the RC4 keystream when the algorithm is keyed according to the WPA specifi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Mathematics of Communications

سال: 2023

ISSN: ['1930-5346', '1930-5338']

DOI: https://doi.org/10.3934/amc.2020132