Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
Gespeichert in:
| Titel: | Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages |
|---|---|
| Autoren: | ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim, Seog Chung Seo |
| Quelle: | Applied Sciences, Vol 10, Iss 5, p 1831 (2020) |
| Verlagsinformationen: | MDPI AG |
| Publikationsjahr: | 2020 |
| Bestand: | Directory of Open Access Journals: DOAJ Articles |
| Schlagwörter: | mceliece, hymes, side-channel analysis, code-based cryptosystem, joint distribution, single trace analysis, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999 |
| Beschreibung: | Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems has been challenged many times, although some of the variants have remained secure. However, recent studies on code-based cryptography have focused on the side-channel resistance since previous studies have indicated that the existing algorithms were vulnerable to side-channel analysis. In this paper, we propose the first side-channel attack on the Hybrid McEliece Scheme (HyMES) using only a single power consumption trace. HyMES is a variant of the McEliece system that provides smaller keys, along with faster encryption and decryption speed. By exploiting joint distributions of nonlinear functions in the decryption process, we were able to recover the private key of HyMES. To the best of our knowledge, this is the first work proposing a side-channel analysis based on a joint distribution of the leakages on the public-key system. |
| Publikationsart: | article in journal/newspaper |
| Sprache: | English |
| Relation: | https://www.mdpi.com/2076-3417/10/5/1831; https://doaj.org/toc/2076-3417; https://doaj.org/article/af10dcca6f93447bab03158f196b1d84 |
| DOI: | 10.3390/app10051831 |
| Verfügbarkeit: | https://doi.org/10.3390/app10051831 https://doaj.org/article/af10dcca6f93447bab03158f196b1d84 |
| Dokumentencode: | edsbas.216D6642 |
| Datenbank: | BASE |
| Abstract: | Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems has been challenged many times, although some of the variants have remained secure. However, recent studies on code-based cryptography have focused on the side-channel resistance since previous studies have indicated that the existing algorithms were vulnerable to side-channel analysis. In this paper, we propose the first side-channel attack on the Hybrid McEliece Scheme (HyMES) using only a single power consumption trace. HyMES is a variant of the McEliece system that provides smaller keys, along with faster encryption and decryption speed. By exploiting joint distributions of nonlinear functions in the decryption process, we were able to recover the private key of HyMES. To the best of our knowledge, this is the first work proposing a side-channel analysis based on a joint distribution of the leakages on the public-key system. |
|---|---|
| DOI: | 10.3390/app10051831 |
Nájsť tento článok vo Web of Science