Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes
 
Loading...
Thumbnail Image
conference paper

Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes

Huguenin-Dumittan, Loïs Evan  
•
Vaudenay, Serge  
2020
Applied Cryptography and Network Security
18th International Conference ACNS 2020 International Conference on Applied Cryptography and Network Security

The US National Institute of Standards and Technology (NIST) recently announced the public-key cryptosystems (PKC) that have passed to the second round of the post-quantum standardization process. Most of these PKC come in two flavours: a weak IND-CPA version and a strongly secure IND-CCA construction. For the weaker scheme, no level of security is claimed in the plaintext-checking attack (PCA) model. However, previous works showed that, for several NIST candidates, only a few PCA queries are sufficient to recover the secret key. In order to create a more complete picture, we design new key-recovery PCA against several round 2 candidates. Our attacks against CRYSTALS-Kyber, HQC, LAC and SABER are all practical and require only a few thousand queries to recover the full secret key. In addition, we present another KR-PCA attack against the rank-based scheme RQC, which needs roughly O(238) queries. Hence, this type of scheme seems to resist better than others to key recovery. Motivated by this observation, we prove an interesting result on the rank metric. Namely, that the learning problem with the rank distance is hard for some parameters, thus invalidating a common strategy for reaction attacks.

  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-030-57808-4_11
Author(s)
Huguenin-Dumittan, Loïs Evan  
•
Vaudenay, Serge  
Date Issued

2020

Publisher

Springer, Cham

Journal
Applied Cryptography and Network Security
ISBN of the book

978-3-030-57807-7

Series title/Series vol.

Lecture Notes in Computer Science; 12146

Start page

208

End page

227

Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
18th International Conference ACNS 2020 International Conference on Applied Cryptography and Network Security

Rome, Italie

Octobre 19-22, 2020

Available on Infoscience
August 28, 2020
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/171204
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés