首页> 外文会议>Post-quantum cryptography >A Timing Attack against the Secret Permutation in the McEliece PKC
【24h】

A Timing Attack against the Secret Permutation in the McEliece PKC

机译:对McEliece PKC中的秘密排列进行定时攻击

获取原文
获取原文并翻译 | 示例

摘要

In this work we present a novel timing attack against the McEliece public key cryptosystem (PKC). In contrast to former works investigating timing attacks that aim at recovering the message, we devise how to exploit a vulnerability in the Patterson algorithm that allows the attacker to gather information about the secret permutation through a timing side channel. This information can be used to dramatically reduce the cost of a brute force attack against the secret key. We also describe the results obtained from a proof of concept implementation of the attack and give an appropriate countermeasure.
机译:在这项工作中,我们提出了针对McEliece公钥密码系统(PKC)的新型定时攻击。与研究旨在恢复消息的定时攻击的先前工作相比,我们设计了如何利用Patterson算法中的漏洞,使攻击者可以通过定时侧通道收集有关秘密置换的信息。该信息可用于显着降低针对密钥的暴力攻击的成本。我们还描述了从概念验证实施攻击中获得的结果,并给出了适当的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号