Paper 2024/1134

Exploiting signature leakages: breaking Enhanced pqsigRM

Thomas Debris-Alazard, Inria Saclay - Île-de-France Research Centre, Computer Science Laboratory of the École Polytechnique
Pierre Loisel, Inria Saclay - Île-de-France Research Centre, Computer Science Laboratory of the École Polytechnique
Valentin Vasseur, Thales (France)
Abstract

Enhanced pqsigRM is a code-based hash-and-sign scheme proposed to the second National Institute of Standards and Technology call for post-quantum signatures. The scheme is based on the $(U,U+V)$-construction and it enjoys remarkably small signature lengths, about $1$KBytes for a security level of $128$ bits. Unfortunately we show that signatures leak information about the underlying $(U,U+V)$-structure. It allows to retrieve the private-key with~$100, 000$ signatures.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Post-Quantum CryptographyCryptanalysisCode-Based Signature Scheme
Contact author(s)
thomas debris @ inria fr
pierre loisel @ inria fr
valentin vasseur @ thalesgroup com
History
2024-07-15: approved
2024-07-12: received
See all versions
Short URL
https://ia.cr/2024/1134
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1134,
      author = {Thomas Debris-Alazard and Pierre Loisel and Valentin Vasseur},
      title = {Exploiting signature leakages: breaking Enhanced {pqsigRM}},
      howpublished = {Cryptology ePrint Archive, Paper 2024/1134},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/1134}},
      url = {https://eprint.iacr.org/2024/1134}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.