Skip to main content
Top
Published in: Designs, Codes and Cryptography 9/2021

12-07-2021

Cryptanalysis of a code-based full-time signature

Authors: Nicolas Aragon, Marco Baldi, Jean-Christophe Deneuville, Karan Khathuria, Edoardo Persichetti, Paolo Santini

Published in: Designs, Codes and Cryptography | Issue 9/2021

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in the SHMWW scheme contains columns coming in part from an identity matrix and in part from a random matrix. The existence of two types of columns leads to a strong bias in the distribution of set bits in produced signatures. Our attack exploits such a bias to recover the private key from a bunch of collected signatures. We provide a theoretical analysis of the attack along with experimental evaluations, and we show that as few as 10 signatures are enough to be collected for successfully recovering the private key. As for previous attempts of adapting Lyubashevsky’s protocol to the case of code-based cryptography, the SHMWW scheme is thus proved unable to provide acceptable security. This confirms that devising secure code-based signature schemes with efficiency comparable to that of other post-quantum solutions (e.g., based on lattices) is still a challenging task.
Appendix
Available only for authorised users
Literature
2.
go back to reference Aragon N., Blazy O., Gaborit P., Hauteville A., Zémor G.: Durandal: a rank metric based signature scheme. In: Ishai Y., Rijmen V. (eds.) Advances in Cryptology - EUROCRYPT 2019, pp. 728–758. Springer International Publishing, Cham (2019).CrossRef Aragon N., Blazy O., Gaborit P., Hauteville A., Zémor G.: Durandal: a rank metric based signature scheme. In: Ishai Y., Rijmen V. (eds.) Advances in Cryptology - EUROCRYPT 2019, pp. 728–758. Springer International Publishing, Cham (2019).CrossRef
5.
go back to reference Bardet M., Briaud P., Bros M., Gaborit P., Neiger V., Ruatta O., Tillich J.: An algebraic attack on rank metric code-based cryptosystems. In: Advances in Cryptology - EUROCRYPT 2020 Proceedings, Part III, Springer, LNCS, vol 12107, pp 64–93 (2020a). Bardet M., Briaud P., Bros M., Gaborit P., Neiger V., Ruatta O., Tillich J.: An algebraic attack on rank metric code-based cryptosystems. In: Advances in Cryptology - EUROCRYPT 2020 Proceedings, Part III, Springer, LNCS, vol 12107, pp 64–93 (2020a).
6.
go back to reference Bardet M., Bros M., Cabarcas D., Gaborit P., Perlner R.A., Smith-Tone D., Tillich J.P., Verbel J.A.: Improvements of algebraic attacks for solving the rank decoding and MinRank problems. In: Moriai S, Wang H (eds) ASIACRYPT 2020, Part I, Springer, Heidelberg, LNCS, vol 12491, pp 507–536, (2020b) https://doi.org/10.1007/978-3-030-64837-4_17. Bardet M., Bros M., Cabarcas D., Gaborit P., Perlner R.A., Smith-Tone D., Tillich J.P., Verbel J.A.: Improvements of algebraic attacks for solving the rank decoding and MinRank problems. In: Moriai S, Wang H (eds) ASIACRYPT 2020, Part I, Springer, Heidelberg, LNCS, vol 12491, pp 507–536, (2020b) https://​doi.​org/​10.​1007/​978-3-030-64837-4_​17.
7.
go back to reference Barg S.: Some new NP-complete coding problems. Problemy Peredachi Informatsii 30(3), 23–28 (1994).MathSciNetMATH Barg S.: Some new NP-complete coding problems. Problemy Peredachi Informatsii 30(3), 23–28 (1994).MathSciNetMATH
8.
go back to reference Bellini E., Caullery F., Gaborit P., Manzano M., Mateu V.: Improved Veron identification and signature schemes in the rank metric. In: 2019 IEEE International Symposium on Information Theory (ISIT), pp 1872–1876 (2019). Bellini E., Caullery F., Gaborit P., Manzano M., Mateu V.: Improved Veron identification and signature schemes in the rank metric. In: 2019 IEEE International Symposium on Information Theory (ISIT), pp 1872–1876 (2019).
10.
go back to reference Biasse J.F., Micheli G., Persichetti E., Santini P.: LESS is more: code-based signatures without syndromes. In: Nitaj A., Youssef A. (eds.) Progress in Cryptology - AFRICACRYPT 2020, pp. 45–65. Springer International Publishing, Cham (2020).CrossRef Biasse J.F., Micheli G., Persichetti E., Santini P.: LESS is more: code-based signatures without syndromes. In: Nitaj A., Youssef A. (eds.) Progress in Cryptology - AFRICACRYPT 2020, pp. 45–65. Springer International Publishing, Cham (2020).CrossRef
11.
go back to reference Cayrel P.L., Véron P., El Yousfi Alaoui S.M.: A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem. In: Selected Areas in Cryptography. Springer, Berlin, pp 171–186 (2011). Cayrel P.L., Véron P., El Yousfi Alaoui S.M.: A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem. In: Selected Areas in Cryptography. Springer, Berlin, pp 171–186 (2011).
13.
go back to reference Debris-Alazard T., Sendrier N., Tillich J.P.: Wave: A new family of trapdoor one-way preimage sampleable functions based on codes. In: Galbraith S.D., Moriai S. (eds) ASIACRYPT 2019, Part I, Springer, Heidelberg, LNCS, vol 11921, pp 21–51, (2019) https://doi.org/10.1007/978-3-030-34578-5_2. Debris-Alazard T., Sendrier N., Tillich J.P.: Wave: A new family of trapdoor one-way preimage sampleable functions based on codes. In: Galbraith S.D., Moriai S. (eds) ASIACRYPT 2019, Part I, Springer, Heidelberg, LNCS, vol 11921, pp 21–51, (2019) https://​doi.​org/​10.​1007/​978-3-030-34578-5_​2.
14.
go back to reference Deneuville J.C., Gaborit P.: Cryptanalysis of a code-based one-time signature. Des. Codes Cryptogr. 88(9), 1857–1866 (2020).MathSciNetCrossRef Deneuville J.C., Gaborit P.: Cryptanalysis of a code-based one-time signature. Des. Codes Cryptogr. 88(9), 1857–1866 (2020).MathSciNetCrossRef
15.
go back to reference Faugere J.C., Gauthier-Umana V., Otmani A., Perret L., Tillich J.P.: A distinguisher for high-rate mceliece cryptosystems. IEEE Trans. Inf. Theory 59(10), 6830–6844 (2013).MathSciNetCrossRef Faugere J.C., Gauthier-Umana V., Otmani A., Perret L., Tillich J.P.: A distinguisher for high-rate mceliece cryptosystems. IEEE Trans. Inf. Theory 59(10), 6830–6844 (2013).MathSciNetCrossRef
18.
go back to reference McEliece R.J.: A public-key system based on algebraic coding theory, Jet Propulsion Lab, DSN Progress Report 44, pp 114–116 (1978). McEliece R.J.: A public-key system based on algebraic coding theory, Jet Propulsion Lab, DSN Progress Report 44, pp 114–116 (1978).
20.
go back to reference Persichetti E.: Improving the efficiency of code-based cryptography. PhD thesis, Department of Mathematics, University of Auckland (2012). Persichetti E.: Improving the efficiency of code-based cryptography. PhD thesis, Department of Mathematics, University of Auckland (2012).
22.
23.
go back to reference Rivest R.L., Shamir A., Adleman L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. Assoc. Comput. Mach. 21(2), 120–126 (1978).MathSciNetMATH Rivest R.L., Shamir A., Adleman L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. Assoc. Comput. Mach. 21(2), 120–126 (1978).MathSciNetMATH
24.
go back to reference Santini P., Baldi M., Chiaraluce F.: Cryptanalysis of a one-time code-based digital signature scheme. In: 2019 IEEE International Symposium on Information Theory (ISIT), pp 2594–2598 (2019). Santini P., Baldi M., Chiaraluce F.: Cryptanalysis of a one-time code-based digital signature scheme. In: 2019 IEEE International Symposium on Information Theory (ISIT), pp 2594–2598 (2019).
27.
go back to reference Stern J.: A new identification scheme based on syndrome decoding. In: Stinson D.R. (ed.) Advances in Cryptology – CRYPTO’ 93, pp. 13–21. Springer, Berlin Heidelberg (1994).CrossRef Stern J.: A new identification scheme based on syndrome decoding. In: Stinson D.R. (ed.) Advances in Cryptology – CRYPTO’ 93, pp. 13–21. Springer, Berlin Heidelberg (1994).CrossRef
Metadata
Title
Cryptanalysis of a code-based full-time signature
Authors
Nicolas Aragon
Marco Baldi
Jean-Christophe Deneuville
Karan Khathuria
Edoardo Persichetti
Paolo Santini
Publication date
12-07-2021
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 9/2021
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-021-00902-7

Other articles of this Issue 9/2021

Designs, Codes and Cryptography 9/2021 Go to the issue

Premium Partner