Paper 2024/1715

OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates

Haiyue Dong, Independent Researcher
Qian Guo, Lund University
Abstract

In this paper, we introduce OT-PCA, a novel approach for conducting Plaintext-Checking (PC) oracle based side-channel attacks, specifically designed for Hamming Quasi-Cyclic (HQC). By calling the publicly accessible HQC decoder, we build offline templates that enable efficient extraction of soft information for hundreds of secret positions with just a single PC oracle call. Our method addresses critical challenges in optimizing key-related information extraction, including maximizing decryption output entropy and ensuring error pattern independence, through the use of genetic-style algorithms. Extensive simulations demonstrate that our new attack method significantly reduces the required number of oracle calls, achieving a 2.4-fold decrease for hqc-128 and even greater reductions for hqc-192 and hqc-256 compared to current state-of-the-art methods. Notably, the attack shows strong resilience against inaccuracy in the PC oracle—when the oracle accuracy decreases to 95%, the reduction factor in oracle call requirements increases to 7.6 for hqc-128. Lastly, a real-world evaluation conducted using power analysis on a platform with an ARM Cortex-M4 microcontroller validates the practical applicability and effectiveness of our approach.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published by the IACR in TCHES 2025
Keywords
Code-based cryptographyNIST PQC standardizationHQCSide-channel attacksKEM
Contact author(s)
chelseadong202 @ gmail com
qian guo @ eit lth se
History
2024-10-21: approved
2024-10-20: received
See all versions
Short URL
https://ia.cr/2024/1715
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1715,
      author = {Haiyue Dong and Qian Guo},
      title = {{OT}-{PCA}: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on {HQC} with Offline Templates},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1715},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1715}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.