Description
Many code-based cryptosystems have been proposed recently, especially in response to the call for post-quantum cryptography standardization issued by the National Institute of Standards and Technologie. Most code-based cryptosystem rely on the same idea: an error-correcting code with some special structural properties (including good error-correction capacity) serves as the private key. This code is transformed and displayed in a form that is (supposedly) indistinguishable from a random code: this serves as the public key. However, in some cases, one can distinguish the public key from a random code. We will present such a distinguisher, the "squared code distinguisher", and how this can be used to perform key recovery attacks in polynomial time on some cryptosystems such as the RLCE scheme [Wang 2016] or the Expanded Reed-Solomon scheme [Khathuria, Rosenthal, Weger 2019].<br/> lien: http://desktop.visio.renater.fr/scopia?ID=723838***5009&autojoin
Next sessions
-
Séminaire C2 à INRIA Paris
Emmanuel Thomé et Pierrick Gaudry Rachelle Heim Boissier Épiphane Nouetowa Dung Bui Plus d'infos sur https://seminaire-c2.inria.fr/ -
Attacking the Supersingular Isogeny Problem: From the Delfs–Galbraith algorithm to oriented graphs
Speaker : Arthur Herlédan Le Merdy - COSIC, KU Leuven
The threat of quantum computers motivates the introduction of new hard problems for cryptography.One promising candidate is the Isogeny problem: given two elliptic curves, compute a “nice’’ map between them, called an isogeny.In this talk, we study classical attacks on this problem, specialised to supersingular elliptic curves, on which the security of current isogeny-based cryptography relies. In[…]-
Cryptography
-