Design and Application of Codes for Post-Quantum Cryptography
Final Report Abstract
This project aimed at improving code- and lattice-based public-key cryptography (PKC) with the goal of obtaining efficient and secure post-quantum systems. It is based on the development of new coding theory suitable for these two types of post-quantum cryptosystems. Our goals were hereby: i) improving the key, ciphertext, and signature sizes; ii) enhancing the reliability of the decryption process; and iii) providing resistance to algorithmic, side-channel, and fault attacks. The significantly larger key, ciphertext, and signature sizes are the most severe drawback of code- and lattice-based post-quantum secure systems compared to traditional cryptography. To turn post-quantum systems practical, these numbers must be decreased while meeting the security levels specified by the National Institute of Standards and Technology (NIST). This project focused on algebraic codes and LWE/Ring-LWE lattices. We estimate the quality of the result by metrics such as key, ciphertext, signature sizes, code rates, security level, and resistance to implementation attacks. We explored potential codes and developed new code constructions that are suitable for both code- and latticebased post-quantum cryptography requirements. Central to this project is to approach post-quantum cryptography from theory and implementation points of view. The theory provided new systems and theoretical attack approaches while the implementation developed methods, architectures, and tools to efficiently implement code- and lattice-based protected cryptosystems able to resist side-channel and fault attacks. The primary tool of this project was error-correcting codes, as they play a crucial role in the design of code-based and lattice-based cryptosystems. Among our results of this project is a power side-channel attack on a NIST finalist, HQC; an analysis of how information leakage can be incorporated into information set decoding attacks; an analysis of RLWE-based cryptosystems as a communication channel, which resulted in improving the parameters of such systems; and the development and implementation of two code-based signature schemes that were submitted to the recent NIST signature competition. The collaboration between the two groups was highly successful since they were complementary in their expertise (coding theory expertise vs. practical attack expertise).
Publications
-
On Software Implementation of Gabidulin Decoders. 2020 Algebraic and Combinatorial Coding Theory (ACCT), 95-101. IEEE.
Kunz, Johannes; Renner, Julian; Maringer, Georg; Schamberger, Thomas & Wachter-Zeh, Antonia
-
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. Lecture Notes in Computer Science, 331-349. Springer International Publishing.
Maringer, Georg; Fritzmann, Tim & Sepúlveda, Johanna
-
A Power Side-Channel Attack on the CCA2-Secure HQC KEM. Lecture Notes in Computer Science, 119-134. Springer International Publishing.
Schamberger, Thomas; Renner, Julian; Sigl, Georg & Wachter-Zeh, Antonia
-
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem. In CBCRYPTO 2022, May 2022.
Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh & Georg Sigl
-
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem. Lecture Notes in Computer Science, 327-352. Springer International Publishing.
Schamberger, Thomas; Holzbaur, Lukas; Renner, Julian; Wachter-Zeh, Antonia & Sigl, Georg
-
Information-Set Decoding with Hints. Lecture Notes in Computer Science, 60-83. Springer International Publishing.
Horlemann, Anna-Lena; Puchinger, Sven; Renner, Julian; Schamberger, Thomas & Wachter-Zeh, Antonia
-
CROSS: Codes and Restricted Objects Signature Scheme, Submission to the NIST Post-Quantum Cryptography Standardization Process, Algorithm Specifications and Supporting Documentation, 2023
Marco Baldi, Alessandro Barenghi, Sebastian Bitzer, Patrick Karl, Felice Manganiello, Alessio Pavoni, Gerardo Pelosi, Paolo Santini, Jonas Schupp, Freeman Slaughter, Antonia Wachter-Zeh & Violetta Weger
-
FuLeeca: A Lee-Based Signature Scheme. Lecture Notes in Computer Science, 56-83. Springer Nature Switzerland.
Ritterhoff, Stefan; Maringer, Georg; Bitzer, Sebastian; Weger, Violetta; Karl, Patrick; Schamberger, Thomas; Schupp, Jonas & Wachter-Zeh, Antonia
-
FuLeeca: Submission to the NIST Post-Quantum Cryptography Standardization Process, Algorithm Specifications and Supporting Documentation, 2023
Stefan Ritterhoff, Sebastian Bitzer, Patrick Karl, Georg Mariner, Thomas Schamberger, Jonas Schupp, Georg Sigl, Antonia Wachter-Zeh & Violetta Weger
-
Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel. IEEE Transactions on Information Forensics and Security, 18, 549-564.
Maringer, Georg; Puchinger, Sven & Wachter-Zeh, Antonia
