Abstract
In this paper, we present a practicable chosen ciphertext timing attack retrieving the secret key of HQC. The attack exploits a correlation between the weight of the error to be decoded and the running time of the decoding algorithm of BCH codes. For the 128-bit security parameters of HQC, the attack runs in less than a minute on a desktop computer using roughly 6000 decoding requests and has a success probability of approximately 93 percent. To prevent this attack, we provide an implementation of a constant time algorithm for the decoding of BCH codes. Our implementation of the countermeasure achieves a constant time execution of the decoding process without a significant performance penalty.
Author supplied keywords
Cite
CITATION STYLE
Wafo-Tapa, G., Bettaieb, S., Bidoux, L., Gaborit, P., & Marcatel, E. (2022). A PRACTICABLE TIMING ATTACK AGAINST HQC AND ITS COUNTERMEASURE. Advances in Mathematics of Communications, 16(3), 621–642. https://doi.org/10.3934/amc.2020126
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.