A new key recovery attack on a code-based signature from the Lyubashevsky framework

被引:1
|
作者
Tan, Chik How [1 ]
Prabowo, Theo Fanuela [1 ]
机构
[1] Natl Univ Singapore, Temasek Labs, 5A Engn Dr 1 09-02, Singapore 117411, Singapore
关键词
Codes; Signature; Statistical attack; Cryptography; SCHEME; IDENTIFICATION;
D O I
10.1016/j.ipl.2023.106422
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a new key recovery attack on a Hamming-metric code-based signature scheme proposed by Song, Huang, Mu, Wu, and Wang (SHMWW). Our attack extends the statistical part of the attack proposed by Aragon, Baldi, Deneuville, Khathuria, Persichetti, and Santini (ABDKPS). In addition to classifying the columns of the secret matrix, we also completely determine the entries of the identity columns of this matrix via statistical method. While we need to collect more signatures, our attack has better time complexity as it requires less than 232 and 235 operations to perform the attack for Para-1 and Para-2 respectively. This gives a tradeoff between the number of required signatures and the running time of the attack. From the simulation using a proof-of-concept Sagemath implementation, a total of no more than 1500 signatures is needed to launch the attack, which can completely recover the secret key in under 45 minutes. When performed in parallel, the attack may recover the secret key in less than 5 seconds. & COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:7
相关论文
共 40 条
  • [21] Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA
    Canto, Alvaro Cintas
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (01)
  • [22] EQRC: An Enhanced QR Code-based Secure E-coupon Transaction Framework
    Liu, Rui
    Song, Jun
    Huang, Zhiming
    Pan, Jianping
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [23] Java']Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph
    Yuan, Dawei
    Fang, Sen
    Zhang, Tao
    Xu, Zhou
    Luo, Xiapu
    IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (02) : 511 - 526
  • [24] Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Wu, Jui-Di
    Huang, Sen-Shan
    INFORMATICA, 2019, 30 (03) : 595 - 612
  • [26] Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller
    Ouyang, Ying
    Tang, Deng
    Xu, Yanhong
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT V, 2025, 15488 : 436 - 470
  • [27] A Triple Unlocking Mechanism Model Against Forging Signature Attack Based on Multivariate Polynomial Public Key Cryptosystem
    Hou, Yongyan
    Dong, Baiyang
    Guo, Wenqiang
    Wang, Xin
    Xiao, Qinkun
    IEEE ACCESS, 2023, 11 (134614-134622) : 134614 - 134622
  • [28] New framework for code-mapping-based reversible data hiding in JPEG images
    Du, Yang
    Yin, Zhaoxia
    INFORMATION SCIENCES, 2022, 609 : 319 - 338
  • [29] Efficient identity-based blind message recovery signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    IET INFORMATION SECURITY, 2018, 12 (02) : 150 - 156
  • [30] A new attack resistant encryption method based on hybrid chaotic-quantum key distribution (CQKD)
    Mamandi, Vida
    Ardalani, Nahid
    Ghalamkari, Behbod
    QUANTUM INFORMATION PROCESSING, 2024, 23 (07)