Attack on the EDON-K Key Encapsulation Mechanism - Archive ouverte HAL Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2018

Attack on the EDON-K Key Encapsulation Mechanism

Résumé

The key encapsulation mechanism EDON-K was proposed in response to the call for post-quantum cryptography standardization issued by the National Institute of Standards and Technologies (NIST). This scheme is inspired by the McEliece scheme but uses another family of codes defined over F 2 128 instead of F2 and is not based on the Hamming metric. It allows significantly shorter public keys than the McEliece scheme. In this paper, we give a polynomial time algorithm that recovers the encapsulated secret. This attack makes the scheme insecure for the intended use. We obtain this result by observing that recovering the error in the McEliece scheme corresponding to EDON-K can be viewed as a decoding problem for the rank-metric. We show that the code used in EDON-K is in fact a super-code of a Low Rank Parity Check (LRPC) code of very small rank (1 or 2). A suitable parity-check matrix for the super-code of such low rank can be easily derived from for the public key. We then use this parity-check matrix in a decoding algorithm that was devised for LRPC codes to recover the error. Finally we explain how we decapsulate the secret once we have found the error.
Fichier principal
Vignette du fichier
1802.06157.pdf (146.03 Ko) Télécharger le fichier
Origine : Publication financée par une institution
Loading...

Dates et versions

hal-01925323 , version 1 (16-11-2018)

Identifiants

Citer

Matthieu Lequesne, Jean-Pierre Tillich. Attack on the EDON-K Key Encapsulation Mechanism. 2018. ⟨hal-01925323⟩

Collections

INRIA INRIA2
57 Consultations
9 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More