A PRACTICABLE TIMING ATTACK AGAINST HQC AND ITS COUNTERMEASURE

5Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we present a practicable chosen ciphertext timing attack retrieving the secret key of HQC. The attack exploits a correlation between the weight of the error to be decoded and the running time of the decoding algorithm of BCH codes. For the 128-bit security parameters of HQC, the attack runs in less than a minute on a desktop computer using roughly 6000 decoding requests and has a success probability of approximately 93 percent. To prevent this attack, we provide an implementation of a constant time algorithm for the decoding of BCH codes. Our implementation of the countermeasure achieves a constant time execution of the decoding process without a significant performance penalty.

Cite

CITATION STYLE

APA

Wafo-Tapa, G., Bettaieb, S., Bidoux, L., Gaborit, P., & Marcatel, E. (2022). A PRACTICABLE TIMING ATTACK AGAINST HQC AND ITS COUNTERMEASURE. Advances in Mathematics of Communications, 16(3), 621–642. https://doi.org/10.3934/amc.2020126

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free