Cryptanalysis of LEDAcrypt
Daniel Apon1, Ray Perlner1, Angela Robinson1, Paolo Santini2
1: NIST 2: Universitร Politecnica delle Marche, Florida Atlantic University
Cryptanalysis of LEDAcrypt Daniel Apon 1 , Ray Perlner 1 , Angela - - PowerPoint PPT Presentation
Cryptanalysis of LEDAcrypt Daniel Apon 1 , Ray Perlner 1 , Angela Robinson 1 , Paolo Santini 2 1: NIST 2: Universit Politecnica delle Marche, Florida Atlantic University Significance We present an attack on the QC-LDPC-McEliece construction
Daniel Apon1, Ray Perlner1, Angela Robinson1, Paolo Santini2
1: NIST 2: Universitร Politecnica delle Marche, Florida Atlantic University
[Baldi et al. 2007]
LEDAcrypt
break
round of the NIST PQC process
LEDAcrypt too similar to its competitor BIKE (BIKE is based on the QC-MDPC-McEliece scheme of [Misoczki et al. 2012])
2
๐ = ๐ โฆ ๐
๐ = ๐
๐
๐บ
๐ฆ / ๐ฆ โ 1
๐ = ๐ผ๐ = ๐ผ โฆ ๐ผ ๐ , โฆ ๐ , โฎ โฑ โฎ ๐ , โฆ ๐ ,
3
arranged like, e.g.:
4
5
recovered by an attack requiring the equivalent of
AES operations
less than the security parameter
๐ฆ = 47.72; ๐ง = 49.22; ๐ฆ + ๐ง = 96.94
๐ฆ = 57.50; ๐ง = 52.54; ๐ฆ + ๐ง = 110.04
we expect ๐ฆ โ 40; ๐ง โ 50
6
7
resulting in
somewhat by trying multiple guesses for the first ๐ bits of a row of ๐๐
by as an MDPC code and running the ISD attack on the previous slide
chosen bits of a row of
9
entirely zero
remaining
, , ,
and contain the supports of and respectively, then all the nonzero bits of the support of are contained in the support of
10
and are chosen carefully
to be zero so we can guess that has the same zero bits
coefficients than the starting polynomials, which would make and quite sparse
and respectively
consecutive coefficients,
nonzero coefficients
11
;
, , is contained in support of , , as appropriate is ~1/4.
would recover 1 in
private keys
12
and will produce the same public key
๐ ๐ ๐,๐ ๐,๐ ๐,๐ ๐,๐
And
๐ท ๐ ๐ธ ๐ ๐น๐ท ๐,๐ ๐น๐ท ๐,๐ ๐น๐ธ ๐,๐ ๐น๐ธ ๐,๐
Are valid private keys with the same public key for any integers !
whether support of ๐ผ, ๐ โฒ contains support of ๐ผ, ๐
about 1 in 2
13
,
,
up to 1 in .
14
about 6 nonzero bits in the information set without increasing the cost of an iteration
be contained in higher-weight polynomials like:
and to be distributed like this: within support of
15
and to be distributed like this: within support of
iteration of ISD up to 1 in .
16
๐โฒ ๐โฒ
17
equivalent key
๐โฒ ๐โฒ
18
for
image under one of these isomorphisms, and everything still works
sets
and result in equivalent information sets)
19
and with the correct weights results in a valid key
rejects any which is not full weight
20
in private keys for the cost of a single matrix inversion
. AES operations, we can recover 1 in . keys
21
requires constraints on the support of
polynomials in the private key
at a time
polynomials, i.e.
,
much as one might naรฏvely think
22
complexity attack on a larger class of somewhat-less-weak keys
consecutive coefficients
consecutive coefficients
๐ผโฒ, and ๐ โฒ,
nearly all of the keys for LEDAcrypt (CPA, Category 5, ) for something like
classical AES operations
23
is exponential in
โ
and are similarly sparse, our attack runs in
โ
and also runs in
โ
parameters
24
problem both asymptotically and concretely
parameter sets
attacks on successively larger classes of keys makes security analysis very difficult
is an identity matrix)
25