Paper 2023/1590
Single trace HQC shared key recovery with SASCA
Abstract
This paper presents practicable single trace attacks against the Hamming Quasi-Cyclic (HQC) Key Encapsulation Mechanism. These attacks are the first Soft Analytical Side-Channel Attacks (SASCA) against code-based cryptography. We mount SASCA based on Belief Propagation (BP) on several steps of HQC's decapsulation process. Firstly, we target the Reed-Solomon (RS) decoder involved in the HQC publicly known code. We perform simulated attacks under Hamming weight leakage model, and reach excellent accuracies (superior to
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Soft Analytical Side-Channel AttackSASCABelief PropagationBPHQCSingle TraceShared Key Recovery
- Contact author(s)
-
guillaume goy @ unilim fr
julien maillard @ cea fr
gaborit @ unilim fr
antoine loiseau @ cea fr - History
- 2024-03-18: revised
- 2023-10-13: received
- See all versions
- Short URL
- https://ia.cr/2023/1590
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/1590, author = {Guillaume Goy and Julien Maillard and Philippe Gaborit and Antoine Loiseau}, title = {Single trace {HQC} shared key recovery with {SASCA}}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1590}, year = {2023}, url = {https://eprint.iacr.org/2023/1590} }