Paper 2019/845

A Reaction Attack against Cryptosystems based on LRPC Codes

Simona Samardjiska, Paolo Santini, Edoardo Persichetti, and Gustavo Banegas

Abstract

Rank metric is a very promising research direction for code-based cryptography. In fact, thanks to the high complexity of generic decoding attacks against codes in this metric, it is possible to easily select parameters that yield very small data sizes. In this paper we analyze cryptosystems based on Low-Rank Parity-Check (LRPC) codes, one of the classes of codes that are efficiently decodable in the rank metric. We show how to exploit the decoding failure rate, which is an inherent feature of these codes, to devise a reaction attack aimed at recovering the private key. As a case study, we cryptanalyze the recent McNie submission to NIST’s Post-Quantum Standardization process. Additionally, we provide details of a simple implementation to validate our approach.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Minor revision. Latincrypt 2019
Keywords
Rank-based cryptographyCode-based cryptographyLRPC cryptosystemsreaction attacksdecryption failures
Contact author(s)
simonas @ cs ru nl
History
2019-07-19: received
Short URL
https://ia.cr/2019/845
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/845,
      author = {Simona Samardjiska and Paolo Santini and Edoardo Persichetti and Gustavo Banegas},
      title = {A Reaction Attack against Cryptosystems based on LRPC Codes},
      howpublished = {Cryptology ePrint Archive, Paper 2019/845},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/845}},
      url = {https://eprint.iacr.org/2019/845}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.