+ All Categories
Home > Documents > Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI...

Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI...

Date post: 05-Jul-2020
Category:
Upload: others
View: 12 times
Download: 0 times
Share this document with a friend
100
C ODE - BASED C RYPTOGRAPHY: S TATE OF THE ART PART I Edoardo Persichetti 18 March 2019 EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 1 / 22
Transcript
Page 1: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOGRAPHY:STATE OF THE ART

PART I

Edoardo Persichetti

18 March 2019

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 1 / 22

Page 2: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

IN THIS TALK

Motivation

Intro: a bit of Background

Conservative Code-Based Cryptography

Considerations

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 2 / 22

Page 3: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

Part I

MOTIVATION

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 3 / 22

Page 4: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

POST-QUANTUM CRYPTOGRAPHY

In a few years time large-scale quantum computers might be reality.

But then (Shor, ’95):

RSADSAECCDiffie-Hellman key exchange

and many others ... not secure !

→ NIST’s Post-Quantum Cryptography Standardization Call

Main areas of research:

Lattice-based cryptography.Hash-based cryptography.Code-based cryptography (McEliece, Niederreiter).Multivariate cryptography.Isogeny-based cryptography.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22

Page 5: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

POST-QUANTUM CRYPTOGRAPHY

In a few years time large-scale quantum computers might be reality.But then (Shor, ’95):

RSADSAECCDiffie-Hellman key exchange

and many others ... not secure !

→ NIST’s Post-Quantum Cryptography Standardization Call

Main areas of research:

Lattice-based cryptography.Hash-based cryptography.Code-based cryptography (McEliece, Niederreiter).Multivariate cryptography.Isogeny-based cryptography.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22

Page 6: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

POST-QUANTUM CRYPTOGRAPHY

In a few years time large-scale quantum computers might be reality.But then (Shor, ’95):

RSADSAECCDiffie-Hellman key exchange

and many others ... not secure !

→ NIST’s Post-Quantum Cryptography Standardization Call

Main areas of research:

Lattice-based cryptography.Hash-based cryptography.Code-based cryptography (McEliece, Niederreiter).Multivariate cryptography.Isogeny-based cryptography.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22

Page 7: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

POST-QUANTUM CRYPTOGRAPHY

In a few years time large-scale quantum computers might be reality.But then (Shor, ’95):

RSADSAECCDiffie-Hellman key exchange

and many others ... not secure !

→ NIST’s Post-Quantum Cryptography Standardization Call

Main areas of research:

Lattice-based cryptography.Hash-based cryptography.Code-based cryptography (McEliece, Niederreiter).Multivariate cryptography.Isogeny-based cryptography.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22

Page 8: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

POST-QUANTUM CRYPTOGRAPHY

In a few years time large-scale quantum computers might be reality.But then (Shor, ’95):

RSADSAECCDiffie-Hellman key exchange

and many others ... not secure !

→ NIST’s Post-Quantum Cryptography Standardization Call

Main areas of research:

Lattice-based cryptography.Hash-based cryptography.Code-based cryptography (McEliece, Niederreiter).Multivariate cryptography.Isogeny-based cryptography.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22

Page 9: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

Part II

INTRO: A BIT OF BACKGROUND

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 5 / 22

Page 10: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT IS CODE-BASED CRYPTOGRAPHY?

The family of cryptographic primitives based on the following.

PROBLEM (COMPUTATIONAL SYNDROME DECODING)

Given: H ∈ F(n−k)×nq , y ∈ F(n−k)

q and t ∈ N.Goal: find a word e ∈ Fn

q with wt(e) ≤ t such that HeT = y.

Decisional version: NP-Complete (Berlekamp, McEliece and van Tilborg, 1978).

Unique solution when t is below a certain threshold.

GV BOUND

For a given finite field Fq and integers n, k , the Gilbert-Varshamov(GV) distance is the largest integer d0 such that

|B(0,d0 − 1)| ≤ qn−k

where B(x , r) = {y ∈ Fnq | d(x , y) ≤ r} is the n-dimensional ball of

radius r centered in x .

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 6 / 22

Page 11: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT IS CODE-BASED CRYPTOGRAPHY?

The family of cryptographic primitives based on the following.

PROBLEM (COMPUTATIONAL SYNDROME DECODING)

Given: H ∈ F(n−k)×nq , y ∈ F(n−k)

q and t ∈ N.Goal: find a word e ∈ Fn

q with wt(e) ≤ t such that HeT = y.

Decisional version: NP-Complete (Berlekamp, McEliece and van Tilborg, 1978).

Unique solution when t is below a certain threshold.

GV BOUND

For a given finite field Fq and integers n, k , the Gilbert-Varshamov(GV) distance is the largest integer d0 such that

|B(0,d0 − 1)| ≤ qn−k

where B(x , r) = {y ∈ Fnq | d(x , y) ≤ r} is the n-dimensional ball of

radius r centered in x .

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 6 / 22

Page 12: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT IS CODE-BASED CRYPTOGRAPHY?

The family of cryptographic primitives based on the following.

PROBLEM (COMPUTATIONAL SYNDROME DECODING)

Given: H ∈ F(n−k)×nq , y ∈ F(n−k)

q and t ∈ N.Goal: find a word e ∈ Fn

q with wt(e) ≤ t such that HeT = y.

Decisional version: NP-Complete (Berlekamp, McEliece and van Tilborg, 1978).

Unique solution when t is below a certain threshold.

GV BOUND

For a given finite field Fq and integers n, k , the Gilbert-Varshamov(GV) distance is the largest integer d0 such that

|B(0,d0 − 1)| ≤ qn−k

where B(x , r) = {y ∈ Fnq | d(x , y) ≤ r} is the n-dimensional ball of

radius r centered in x .

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 6 / 22

Page 13: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT IS CODE-BASED CRYPTOGRAPHY?

The family of cryptographic primitives based on the following.

PROBLEM (COMPUTATIONAL SYNDROME DECODING)

Given: H ∈ F(n−k)×nq , y ∈ F(n−k)

q and t ∈ N.Goal: find a word e ∈ Fn

q with wt(e) ≤ t such that HeT = y.

Decisional version: NP-Complete (Berlekamp, McEliece and van Tilborg, 1978).

Unique solution when t is below a certain threshold.

GV BOUND

For a given finite field Fq and integers n, k , the Gilbert-Varshamov(GV) distance is the largest integer d0 such that

|B(0,d0 − 1)| ≤ qn−k

where B(x , r) = {y ∈ Fnq | d(x , y) ≤ r} is the n-dimensional ball of

radius r centered in x .

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 6 / 22

Page 14: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT IS CODE-BASED CRYPTOGRAPHY?

The family of cryptographic primitives based on the following.

PROBLEM (COMPUTATIONAL SYNDROME DECODING)

Given: H ∈ F(n−k)×nq , y ∈ F(n−k)

q and t ∈ N.Goal: find a word e ∈ Fn

q with wt(e) ≤ t such that HeT = y.

Decisional version: NP-Complete (Berlekamp, McEliece and van Tilborg, 1978).

Unique solution when t is below a certain threshold.

GV BOUND

For a given finite field Fq and integers n, k , the Gilbert-Varshamov(GV) distance is the largest integer d0 such that

|B(0,d0 − 1)| ≤ qn−k

where B(x , r) = {y ∈ Fnq | d(x , y) ≤ r} is the n-dimensional ball of

radius r centered in x .

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 6 / 22

Page 15: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT IS CODE-BASED CRYPTOGRAPHY?

The family of cryptographic primitives based on the following.

PROBLEM (COMPUTATIONAL SYNDROME DECODING)

Given: H ∈ F(n−k)×nq , y ∈ F(n−k)

q and t ∈ N.Goal: find a word e ∈ Fn

q with wt(e) ≤ t such that HeT = y.

Decisional version: NP-Complete (Berlekamp, McEliece and van Tilborg, 1978).

Unique solution when t is below a certain threshold.

GV BOUND

For a given finite field Fq and integers n, k , the Gilbert-Varshamov(GV) distance is the largest integer d0 such that

|B(0,d0 − 1)| ≤ qn−k

where B(x , r) = {y ∈ Fnq | d(x , y) ≤ r} is the n-dimensional ball of

radius r centered in x .

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 6 / 22

Page 16: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ERROR-CORRECTING CODES

[n, k ] LINEAR CODE OVER Fq

A subspace of dimension k of Fnq .

t-error correcting: ∃ algorithm that corrects up to t errors.

HAMMING METRIC

wt(x) = |{i : xi 6= 0,1 ≤ i ≤ n}|, d(x , y) = wt(x − y).Minimum distance (of C): min{d(x , y) : x , y ∈ C}.

GENERATOR MATRIX

G ∈ Fk×nq defines the code as follows: x∈CG ⇐⇒ x = µG for µ ∈ Fk

q .Systematic form: (Ik |M).

PARITY-CHECK MATRIX

H ∈ F(n−k)×nq defines the code as follows: x∈CH ⇐⇒ HxT = 0.

Systematic form: (MT |In−k ).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 7 / 22

Page 17: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ERROR-CORRECTING CODES

[n, k ] LINEAR CODE OVER Fq

A subspace of dimension k of Fnq .

t-error correcting: ∃ algorithm that corrects up to t errors.

HAMMING METRIC

wt(x) = |{i : xi 6= 0,1 ≤ i ≤ n}|, d(x , y) = wt(x − y).Minimum distance (of C): min{d(x , y) : x , y ∈ C}.

GENERATOR MATRIX

G ∈ Fk×nq defines the code as follows: x∈CG ⇐⇒ x = µG for µ ∈ Fk

q .Systematic form: (Ik |M).

PARITY-CHECK MATRIX

H ∈ F(n−k)×nq defines the code as follows: x∈CH ⇐⇒ HxT = 0.

Systematic form: (MT |In−k ).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 7 / 22

Page 18: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ERROR-CORRECTING CODES

[n, k ] LINEAR CODE OVER Fq

A subspace of dimension k of Fnq .

t-error correcting: ∃ algorithm that corrects up to t errors.

HAMMING METRIC

wt(x) = |{i : xi 6= 0,1 ≤ i ≤ n}|, d(x , y) = wt(x − y).Minimum distance (of C): min{d(x , y) : x , y ∈ C}.

GENERATOR MATRIX

G ∈ Fk×nq defines the code as follows: x∈CG ⇐⇒ x = µG for µ ∈ Fk

q .Systematic form: (Ik |M).

PARITY-CHECK MATRIX

H ∈ F(n−k)×nq defines the code as follows: x∈CH ⇐⇒ HxT = 0.

Systematic form: (MT |In−k ).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 7 / 22

Page 19: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ERROR-CORRECTING CODES

[n, k ] LINEAR CODE OVER Fq

A subspace of dimension k of Fnq .

t-error correcting: ∃ algorithm that corrects up to t errors.

HAMMING METRIC

wt(x) = |{i : xi 6= 0,1 ≤ i ≤ n}|, d(x , y) = wt(x − y).Minimum distance (of C): min{d(x , y) : x , y ∈ C}.

GENERATOR MATRIX

G ∈ Fk×nq defines the code as follows: x∈CG ⇐⇒ x = µG for µ ∈ Fk

q .Systematic form: (Ik |M).

PARITY-CHECK MATRIX

H ∈ F(n−k)×nq defines the code as follows: x∈CH ⇐⇒ HxT = 0.

Systematic form: (MT |In−k ).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 7 / 22

Page 20: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

(DE)CODING PROBLEMS

In general, it is hard to decode random codes.

PROBLEM (GENERAL DECODING)Given: G ∈ Fk×n

q , y ∈ Fnq and t ∈ N.

Goal: find a word e ∈ Fnq with wt(e) ≤ t such that y − e ∈ CG.

Easy to see the two problems are equivalent.

To get trapdoor, need one more ingredient.

ASSUMPTION (CODE INDISTINGUISHABILITY)Let M be a matrix defining a code. Then M is indistinguishable from arandomly generated matrix of the same size.

Choose a code family with efficient decoding algorithm associated todescription ∆ and hide the structure.

Hardness of assumption depends on chosen code family.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 8 / 22

Page 21: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

(DE)CODING PROBLEMS

In general, it is hard to decode random codes.

PROBLEM (GENERAL DECODING)Given: G ∈ Fk×n

q , y ∈ Fnq and t ∈ N.

Goal: find a word e ∈ Fnq with wt(e) ≤ t such that y − e ∈ CG.

Easy to see the two problems are equivalent.

To get trapdoor, need one more ingredient.

ASSUMPTION (CODE INDISTINGUISHABILITY)Let M be a matrix defining a code. Then M is indistinguishable from arandomly generated matrix of the same size.

Choose a code family with efficient decoding algorithm associated todescription ∆ and hide the structure.

Hardness of assumption depends on chosen code family.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 8 / 22

Page 22: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

(DE)CODING PROBLEMS

In general, it is hard to decode random codes.

PROBLEM (GENERAL DECODING)Given: G ∈ Fk×n

q , y ∈ Fnq and t ∈ N.

Goal: find a word e ∈ Fnq with wt(e) ≤ t such that y − e ∈ CG.

Easy to see the two problems are equivalent.

To get trapdoor, need one more ingredient.

ASSUMPTION (CODE INDISTINGUISHABILITY)Let M be a matrix defining a code. Then M is indistinguishable from arandomly generated matrix of the same size.

Choose a code family with efficient decoding algorithm associated todescription ∆ and hide the structure.

Hardness of assumption depends on chosen code family.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 8 / 22

Page 23: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

(DE)CODING PROBLEMS

In general, it is hard to decode random codes.

PROBLEM (GENERAL DECODING)Given: G ∈ Fk×n

q , y ∈ Fnq and t ∈ N.

Goal: find a word e ∈ Fnq with wt(e) ≤ t such that y − e ∈ CG.

Easy to see the two problems are equivalent.

To get trapdoor, need one more ingredient.

ASSUMPTION (CODE INDISTINGUISHABILITY)Let M be a matrix defining a code. Then M is indistinguishable from arandomly generated matrix of the same size.

Choose a code family with efficient decoding algorithm associated todescription ∆ and hide the structure.

Hardness of assumption depends on chosen code family.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 8 / 22

Page 24: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

(DE)CODING PROBLEMS

In general, it is hard to decode random codes.

PROBLEM (GENERAL DECODING)Given: G ∈ Fk×n

q , y ∈ Fnq and t ∈ N.

Goal: find a word e ∈ Fnq with wt(e) ≤ t such that y − e ∈ CG.

Easy to see the two problems are equivalent.

To get trapdoor, need one more ingredient.

ASSUMPTION (CODE INDISTINGUISHABILITY)Let M be a matrix defining a code. Then M is indistinguishable from arandomly generated matrix of the same size.

Choose a code family with efficient decoding algorithm associated todescription ∆ and hide the structure.

Hardness of assumption depends on chosen code family.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 8 / 22

Page 25: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

(DE)CODING PROBLEMS

In general, it is hard to decode random codes.

PROBLEM (GENERAL DECODING)Given: G ∈ Fk×n

q , y ∈ Fnq and t ∈ N.

Goal: find a word e ∈ Fnq with wt(e) ≤ t such that y − e ∈ CG.

Easy to see the two problems are equivalent.

To get trapdoor, need one more ingredient.

ASSUMPTION (CODE INDISTINGUISHABILITY)Let M be a matrix defining a code. Then M is indistinguishable from arandomly generated matrix of the same size.

Choose a code family with efficient decoding algorithm associated todescription ∆ and hide the structure.

Hardness of assumption depends on chosen code family.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 8 / 22

Page 26: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

(DE)CODING PROBLEMS

In general, it is hard to decode random codes.

PROBLEM (GENERAL DECODING)Given: G ∈ Fk×n

q , y ∈ Fnq and t ∈ N.

Goal: find a word e ∈ Fnq with wt(e) ≤ t such that y − e ∈ CG.

Easy to see the two problems are equivalent.

To get trapdoor, need one more ingredient.

ASSUMPTION (CODE INDISTINGUISHABILITY)Let M be a matrix defining a code. Then M is indistinguishable from arandomly generated matrix of the same size.

Choose a code family with efficient decoding algorithm associated todescription ∆ and hide the structure.

Hardness of assumption depends on chosen code family.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 8 / 22

Page 27: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOSYSTEMS

McEliece: first proposal (1978), based on GDP.

Chosen code family: binary Goppa codes.

KeyGen chooses generator matrix G and forms public key as SGP.

Plaintext is encrypted as noisy codeword (scheme is probabilistic).

Niederreiter: “dual”/equivalent version (1985), based on SDP.

Chosen code family: Generalized Reed-Solomon (GRS) codes.

KeyGen chooses parity-check matrix H and forms public key as SHP.

Plaintext is encrypted as low-weight vector (scheme is deterministic).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 9 / 22

Page 28: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOSYSTEMS

McEliece: first proposal (1978), based on GDP.

Chosen code family: binary Goppa codes.

KeyGen chooses generator matrix G and forms public key as SGP.

Plaintext is encrypted as noisy codeword (scheme is probabilistic).

Niederreiter: “dual”/equivalent version (1985), based on SDP.

Chosen code family: Generalized Reed-Solomon (GRS) codes.

KeyGen chooses parity-check matrix H and forms public key as SHP.

Plaintext is encrypted as low-weight vector (scheme is deterministic).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 9 / 22

Page 29: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOSYSTEMS

McEliece: first proposal (1978), based on GDP.

Chosen code family: binary Goppa codes.

KeyGen chooses generator matrix G and forms public key as SGP.

Plaintext is encrypted as noisy codeword (scheme is probabilistic).

Niederreiter: “dual”/equivalent version (1985), based on SDP.

Chosen code family: Generalized Reed-Solomon (GRS) codes.

KeyGen chooses parity-check matrix H and forms public key as SHP.

Plaintext is encrypted as low-weight vector (scheme is deterministic).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 9 / 22

Page 30: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOSYSTEMS

McEliece: first proposal (1978), based on GDP.

Chosen code family: binary Goppa codes.

KeyGen chooses generator matrix G and forms public key as SGP.

Plaintext is encrypted as noisy codeword (scheme is probabilistic).

Niederreiter: “dual”/equivalent version (1985), based on SDP.

Chosen code family: Generalized Reed-Solomon (GRS) codes.

KeyGen chooses parity-check matrix H and forms public key as SHP.

Plaintext is encrypted as low-weight vector (scheme is deterministic).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 9 / 22

Page 31: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOSYSTEMS

McEliece: first proposal (1978), based on GDP.

Chosen code family: binary Goppa codes.

KeyGen chooses generator matrix G and forms public key as SGP.

Plaintext is encrypted as noisy codeword (scheme is probabilistic).

Niederreiter: “dual”/equivalent version (1985), based on SDP.

Chosen code family: Generalized Reed-Solomon (GRS) codes.

KeyGen chooses parity-check matrix H and forms public key as SHP.

Plaintext is encrypted as low-weight vector (scheme is deterministic).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 9 / 22

Page 32: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOSYSTEMS

McEliece: first proposal (1978), based on GDP.

Chosen code family: binary Goppa codes.

KeyGen chooses generator matrix G and forms public key as SGP.

Plaintext is encrypted as noisy codeword (scheme is probabilistic).

Niederreiter: “dual”/equivalent version (1985), based on SDP.

Chosen code family: Generalized Reed-Solomon (GRS) codes.

KeyGen chooses parity-check matrix H and forms public key as SHP.

Plaintext is encrypted as low-weight vector (scheme is deterministic).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 9 / 22

Page 33: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOSYSTEMS

McEliece: first proposal (1978), based on GDP.

Chosen code family: binary Goppa codes.

KeyGen chooses generator matrix G and forms public key as SGP.

Plaintext is encrypted as noisy codeword (scheme is probabilistic).

Niederreiter: “dual”/equivalent version (1985), based on SDP.

Chosen code family: Generalized Reed-Solomon (GRS) codes.

KeyGen chooses parity-check matrix H and forms public key as SHP.

Plaintext is encrypted as low-weight vector (scheme is deterministic).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 9 / 22

Page 34: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CODE-BASED CRYPTOSYSTEMS

McEliece: first proposal (1978), based on GDP.

Chosen code family: binary Goppa codes.

KeyGen chooses generator matrix G and forms public key as SGP.

Plaintext is encrypted as noisy codeword (scheme is probabilistic).

Niederreiter: “dual”/equivalent version (1985), based on SDP.

Chosen code family: Generalized Reed-Solomon (GRS) codes.

KeyGen chooses parity-check matrix H and forms public key as SHP.

Plaintext is encrypted as low-weight vector (scheme is deterministic).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 9 / 22

Page 35: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

MCELIECE PKE (MODERN)

KEY GENERATION

Choose t-error correcting code C.SK : code description ∆ for C.PK : generator matrix G in systematic form for C.

ENCRYPTION

Plaintext is a word µ ∈ Fk2.

Select random error vector e ∈ Fn2 of weight t .

c = µG + e.

DECRYPTION

Set µ = Decode∆(c) and return µ.Return ⊥ if decoding fails.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 10 / 22

Page 36: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

MCELIECE PKE (MODERN)

KEY GENERATION

Choose t-error correcting code C.SK : code description ∆ for C.PK : generator matrix G in systematic form for C.

ENCRYPTION

Plaintext is a word µ ∈ Fk2.

Select random error vector e ∈ Fn2 of weight t .

c = µG + e.

DECRYPTION

Set µ = Decode∆(c) and return µ.Return ⊥ if decoding fails.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 10 / 22

Page 37: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

MCELIECE PKE (MODERN)

KEY GENERATION

Choose t-error correcting code C.SK : code description ∆ for C.PK : generator matrix G in systematic form for C.

ENCRYPTION

Plaintext is a word µ ∈ Fk2.

Select random error vector e ∈ Fn2 of weight t .

c = µG + e.

DECRYPTION

Set µ = Decode∆(c) and return µ.Return ⊥ if decoding fails.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 10 / 22

Page 38: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

NIEDERREITER PKE (MODERN)

KEY GENERATION

Choose t-error correcting code C.SK: code description ∆ for C.PK: parity-check matrix H in systematic form for C.

ENCRYPTION

Plaintext is a word e ∈ Fn2 of weight t .

c = HeT .

DECRYPTION

Set e = Decode∆(c) and return e.Return ⊥ if decoding fails.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 11 / 22

Page 39: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

NIEDERREITER PKE (MODERN)

KEY GENERATION

Choose t-error correcting code C.SK: code description ∆ for C.PK: parity-check matrix H in systematic form for C.

ENCRYPTION

Plaintext is a word e ∈ Fn2 of weight t .

c = HeT .

DECRYPTION

Set e = Decode∆(c) and return e.Return ⊥ if decoding fails.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 11 / 22

Page 40: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

NIEDERREITER PKE (MODERN)

KEY GENERATION

Choose t-error correcting code C.SK: code description ∆ for C.PK: parity-check matrix H in systematic form for C.

ENCRYPTION

Plaintext is a word e ∈ Fn2 of weight t .

c = HeT .

DECRYPTION

Set e = Decode∆(c) and return e.Return ⊥ if decoding fails.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 11 / 22

Page 41: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

SECURITY

Both encryption schemes are only OW-CPA (OW-Passive) secure.

Given that assumption is true, best attack is generic search onrandom codes.

Paradigm: Information Set Decoding (ISD)(Prange,1962).

In a nutshell: look for Information Set (set of columns carrying theinformation symbols) which is error-free.

Several variants use Birthday Paradox and other tricks to obtain somespeed-ups.

Complexity 2t(c+o(1)), constant c depending on algorithm, code anderror rate.

Use ISD as a tool to assess security level.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 12 / 22

Page 42: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

SECURITY

Both encryption schemes are only OW-CPA (OW-Passive) secure.

Given that assumption is true, best attack is generic search onrandom codes.

Paradigm: Information Set Decoding (ISD)(Prange,1962).

In a nutshell: look for Information Set (set of columns carrying theinformation symbols) which is error-free.

Several variants use Birthday Paradox and other tricks to obtain somespeed-ups.

Complexity 2t(c+o(1)), constant c depending on algorithm, code anderror rate.

Use ISD as a tool to assess security level.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 12 / 22

Page 43: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

SECURITY

Both encryption schemes are only OW-CPA (OW-Passive) secure.

Given that assumption is true, best attack is generic search onrandom codes.

Paradigm: Information Set Decoding (ISD)(Prange,1962).

In a nutshell: look for Information Set (set of columns carrying theinformation symbols) which is error-free.

Several variants use Birthday Paradox and other tricks to obtain somespeed-ups.

Complexity 2t(c+o(1)), constant c depending on algorithm, code anderror rate.

Use ISD as a tool to assess security level.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 12 / 22

Page 44: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

SECURITY

Both encryption schemes are only OW-CPA (OW-Passive) secure.

Given that assumption is true, best attack is generic search onrandom codes.

Paradigm: Information Set Decoding (ISD)(Prange,1962).

In a nutshell: look for Information Set (set of columns carrying theinformation symbols) which is error-free.

Several variants use Birthday Paradox and other tricks to obtain somespeed-ups.

Complexity 2t(c+o(1)), constant c depending on algorithm, code anderror rate.

Use ISD as a tool to assess security level.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 12 / 22

Page 45: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

SECURITY

Both encryption schemes are only OW-CPA (OW-Passive) secure.

Given that assumption is true, best attack is generic search onrandom codes.

Paradigm: Information Set Decoding (ISD)(Prange,1962).

In a nutshell: look for Information Set (set of columns carrying theinformation symbols) which is error-free.

Several variants use Birthday Paradox and other tricks to obtain somespeed-ups.

Complexity 2t(c+o(1)), constant c depending on algorithm, code anderror rate.

Use ISD as a tool to assess security level.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 12 / 22

Page 46: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

SECURITY

Both encryption schemes are only OW-CPA (OW-Passive) secure.

Given that assumption is true, best attack is generic search onrandom codes.

Paradigm: Information Set Decoding (ISD)(Prange,1962).

In a nutshell: look for Information Set (set of columns carrying theinformation symbols) which is error-free.

Several variants use Birthday Paradox and other tricks to obtain somespeed-ups.

Complexity 2t(c+o(1)), constant c depending on algorithm, code anderror rate.

Use ISD as a tool to assess security level.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 12 / 22

Page 47: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

SECURITY

Both encryption schemes are only OW-CPA (OW-Passive) secure.

Given that assumption is true, best attack is generic search onrandom codes.

Paradigm: Information Set Decoding (ISD)(Prange,1962).

In a nutshell: look for Information Set (set of columns carrying theinformation symbols) which is error-free.

Several variants use Birthday Paradox and other tricks to obtain somespeed-ups.

Complexity 2t(c+o(1)), constant c depending on algorithm, code anderror rate.

Use ISD as a tool to assess security level.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 12 / 22

Page 48: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

Part III

CONSERVATIVE CODE-BASED

CRYPTOGRAPHY

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 13 / 22

Page 49: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 50: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 51: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 52: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 53: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 54: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 55: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 56: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 57: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OVERALL STRATEGY

1. Code family.

Nearly every code choice has been shown to be insecureGRSReed-MullerConcatenatedElliptic...

→ Plain binary Goppa codes secure for 40 years.

2. Protocol.

Ideal use of PKC: exchange a key for symmetric cipher.

→ Focus on designing KEM.

3. Framework.

Since we use a KEM, “plaintext” is randomly generated.

→ More practical to use Niederreiter.EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 14 / 22

Page 58: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CLASSIC MCELIECE: A BINARY GOPPA-BASED KEM

Select hash functions H,K (in practice, just use SHAKE-256).

KEY GENERATION

Choose a Goppa code C.SK: description (g, α1, . . . αn) for C plus random string s.PK: parity-check matrix H in systematic form for C.

ENCAPSULATION

Sample a word e ∈ Fn2 of weight t .

c = (c0, c1) where c0 = HeT , c1 = H(e).K = K(c,e)

DECRYPTION

Set e′ = Decode(c0).

c′ = (c′0, c′1) where c′0 = He′T , c′1 = H(e′).

Return K = K(c′, s) if decoding fails or c 6= c′.Else return K = K(c′,e′).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 15 / 22

Page 59: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CLASSIC MCELIECE: A BINARY GOPPA-BASED KEM

Select hash functions H,K (in practice, just use SHAKE-256).

KEY GENERATION

Choose a Goppa code C.SK: description (g, α1, . . . αn) for C plus random string s.PK: parity-check matrix H in systematic form for C.

ENCAPSULATION

Sample a word e ∈ Fn2 of weight t .

c = (c0, c1) where c0 = HeT , c1 = H(e).K = K(c,e)

DECRYPTION

Set e′ = Decode(c0).

c′ = (c′0, c′1) where c′0 = He′T , c′1 = H(e′).

Return K = K(c′, s) if decoding fails or c 6= c′.Else return K = K(c′,e′).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 15 / 22

Page 60: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CLASSIC MCELIECE: A BINARY GOPPA-BASED KEM

Select hash functions H,K (in practice, just use SHAKE-256).

KEY GENERATION

Choose a Goppa code C.SK: description (g, α1, . . . αn) for C plus random string s.PK: parity-check matrix H in systematic form for C.

ENCAPSULATION

Sample a word e ∈ Fn2 of weight t .

c = (c0, c1) where c0 = HeT , c1 = H(e).K = K(c,e)

DECRYPTION

Set e′ = Decode(c0).

c′ = (c′0, c′1) where c′0 = He′T , c′1 = H(e′).

Return K = K(c′, s) if decoding fails or c 6= c′.Else return K = K(c′,e′).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 15 / 22

Page 61: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

CLASSIC MCELIECE: A BINARY GOPPA-BASED KEM

Select hash functions H,K (in practice, just use SHAKE-256).

KEY GENERATION

Choose a Goppa code C.SK: description (g, α1, . . . αn) for C plus random string s.PK: parity-check matrix H in systematic form for C.

ENCAPSULATION

Sample a word e ∈ Fn2 of weight t .

c = (c0, c1) where c0 = HeT , c1 = H(e).K = K(c,e)

DECRYPTION

Set e′ = Decode(c0).

c′ = (c′0, c′1) where c′0 = He′T , c′1 = H(e′).

Return K = K(c′, s) if decoding fails or c 6= c′.Else return K = K(c′,e′).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 15 / 22

Page 62: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 63: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 64: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 65: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 66: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 67: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 68: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 69: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 70: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

ALTERNATIVE: NTS-KEM

Independent work, similar in spirit. Main differences:

1. Monic Squarefree Goppa poly (vs Irreducible).

No significant advantage either way, but irreducible is more“conservative”.

2. Permuted systematic form during key generation (vs Unpermuted).

100% success chance (vs 29%) but not constant time (would beslower).

Also, expanding seed for private key is more expensive.

3. Obfuscated ciphertext (vs traditional (HeT ,H(e))).

Same length, more complicated description, no advantages.

In fact, obfuscated ciphertext is equivalent to traditional.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 16 / 22

Page 71: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 72: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 73: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 74: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 75: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 76: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 77: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 78: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 79: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

OBFUSCATING CIPHERTEXTS

Consider public matrix M, i.e. H = (Ik |M).

Generate e = (ec ,ea,eb) of size (n − k) + (k − 256) + 256 bits.

c = (c0, c1) where c0 = ec + M(ea,H(e))T , c1 = H(e) + eb.

Generate e as usual and call ec ,ea,eb as above.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e).

Tweak c1 by adding eb: still uniform random hash.

c = (c0, c1) where c0 = ec + M(ea,eb)T , c1 = H(e) + eb.

Define public function Obfuscate(A,B) = (A + M(0,B)T ,B).

Then Obfuscate(c0, c1) is an NTS-KEM ciphertext.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 17 / 22

Page 80: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

BLOCK LENGTH

NTS-KEM requires n = 2m, not true for Classic McEliece.

n < 2m little extra implementation effort, but allows more flexibility.

Possibility of tradeoff with data sizes.

NTS-KEM parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 136 1,419,704 19,890 253 513 8,192 80 929,760 17,524 162 312 4,096 64 319,488 9,216 128 1

Classic McEliece parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 128 1,357,824 14,080 240 513 6,960 119 1,046,739 13,908 226 513 6,688 128 1,044,992 13,892 240 513 4,608 96 524,160 13,568 188 312 3,488 64 261,120 6,452 128 1

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 18 / 22

Page 81: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

BLOCK LENGTH

NTS-KEM requires n = 2m, not true for Classic McEliece.

n < 2m little extra implementation effort, but allows more flexibility.

Possibility of tradeoff with data sizes.

NTS-KEM parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 136 1,419,704 19,890 253 513 8,192 80 929,760 17,524 162 312 4,096 64 319,488 9,216 128 1

Classic McEliece parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 128 1,357,824 14,080 240 513 6,960 119 1,046,739 13,908 226 513 6,688 128 1,044,992 13,892 240 513 4,608 96 524,160 13,568 188 312 3,488 64 261,120 6,452 128 1

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 18 / 22

Page 82: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

BLOCK LENGTH

NTS-KEM requires n = 2m, not true for Classic McEliece.

n < 2m little extra implementation effort, but allows more flexibility.

Possibility of tradeoff with data sizes.

NTS-KEM parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 136 1,419,704 19,890 253 513 8,192 80 929,760 17,524 162 312 4,096 64 319,488 9,216 128 1

Classic McEliece parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 128 1,357,824 14,080 240 513 6,960 119 1,046,739 13,908 226 513 6,688 128 1,044,992 13,892 240 513 4,608 96 524,160 13,568 188 312 3,488 64 261,120 6,452 128 1

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 18 / 22

Page 83: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

BLOCK LENGTH

NTS-KEM requires n = 2m, not true for Classic McEliece.

n < 2m little extra implementation effort, but allows more flexibility.

Possibility of tradeoff with data sizes.

NTS-KEM parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 136 1,419,704 19,890 253 513 8,192 80 929,760 17,524 162 312 4,096 64 319,488 9,216 128 1

Classic McEliece parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 128 1,357,824 14,080 240 513 6,960 119 1,046,739 13,908 226 513 6,688 128 1,044,992 13,892 240 513 4,608 96 524,160 13,568 188 312 3,488 64 261,120 6,452 128 1

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 18 / 22

Page 84: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

BLOCK LENGTH

NTS-KEM requires n = 2m, not true for Classic McEliece.

n < 2m little extra implementation effort, but allows more flexibility.

Possibility of tradeoff with data sizes.

NTS-KEM parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 136 1,419,704 19,890 253 513 8,192 80 929,760 17,524 162 312 4,096 64 319,488 9,216 128 1

Classic McEliece parameters (bytes):

m n t PK Size SK Size Ciph Size Security13 8,192 128 1,357,824 14,080 240 513 6,960 119 1,046,739 13,908 226 513 6,688 128 1,044,992 13,892 240 513 4,608 96 524,160 13,568 188 312 3,488 64 261,120 6,452 128 1

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 18 / 22

Page 85: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

Part IV

FINAL CONSIDERATIONS

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 19 / 22

Page 86: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

INHERENT ASPECTS OF CONSERVATIVE CBC

Very simple description (binary objects, low-weight XOR).

Very fast implementation (encapsulation/decapsulation).

Very small ciphertext size.

No decryption failures.

Long-term static keys + easy, tight IND-CCA reduction(Bernstein, P., 2018).

40 years of security history.

Very large key and slow key generation.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 20 / 22

Page 87: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

INHERENT ASPECTS OF CONSERVATIVE CBC

Very simple description (binary objects, low-weight XOR).

Very fast implementation (encapsulation/decapsulation).

Very small ciphertext size.

No decryption failures.

Long-term static keys + easy, tight IND-CCA reduction(Bernstein, P., 2018).

40 years of security history.

Very large key and slow key generation.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 20 / 22

Page 88: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

INHERENT ASPECTS OF CONSERVATIVE CBC

Very simple description (binary objects, low-weight XOR).

Very fast implementation (encapsulation/decapsulation).

Very small ciphertext size.

No decryption failures.

Long-term static keys + easy, tight IND-CCA reduction(Bernstein, P., 2018).

40 years of security history.

Very large key and slow key generation.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 20 / 22

Page 89: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

INHERENT ASPECTS OF CONSERVATIVE CBC

Very simple description (binary objects, low-weight XOR).

Very fast implementation (encapsulation/decapsulation).

Very small ciphertext size.

No decryption failures.

Long-term static keys + easy, tight IND-CCA reduction(Bernstein, P., 2018).

40 years of security history.

Very large key and slow key generation.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 20 / 22

Page 90: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

INHERENT ASPECTS OF CONSERVATIVE CBC

Very simple description (binary objects, low-weight XOR).

Very fast implementation (encapsulation/decapsulation).

Very small ciphertext size.

No decryption failures.

Long-term static keys + easy, tight IND-CCA reduction(Bernstein, P., 2018).

40 years of security history.

Very large key and slow key generation.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 20 / 22

Page 91: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

INHERENT ASPECTS OF CONSERVATIVE CBC

Very simple description (binary objects, low-weight XOR).

Very fast implementation (encapsulation/decapsulation).

Very small ciphertext size.

No decryption failures.

Long-term static keys + easy, tight IND-CCA reduction(Bernstein, P., 2018).

40 years of security history.

Very large key and slow key generation.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 20 / 22

Page 92: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

INHERENT ASPECTS OF CONSERVATIVE CBC

Very simple description (binary objects, low-weight XOR).

Very fast implementation (encapsulation/decapsulation).

Very small ciphertext size.

No decryption failures.

Long-term static keys + easy, tight IND-CCA reduction(Bernstein, P., 2018).

40 years of security history.

Very large key and slow key generation.

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 20 / 22

Page 93: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT ABOUT SIGNATURES?

Long time standing open problem.

4 NIST submissions, 0 survivors: all withdrawn/broken.

Inherent problem with metric.

Hash-and-sign: disjoint “balls” don’t cover space.

Fiat-Shamir: “sparse” masking vector doesn’t hide secret.

Out of scope of these talks (but happy to discuss!).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 21 / 22

Page 94: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT ABOUT SIGNATURES?

Long time standing open problem.

4 NIST submissions, 0 survivors: all withdrawn/broken.

Inherent problem with metric.

Hash-and-sign: disjoint “balls” don’t cover space.

Fiat-Shamir: “sparse” masking vector doesn’t hide secret.

Out of scope of these talks (but happy to discuss!).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 21 / 22

Page 95: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT ABOUT SIGNATURES?

Long time standing open problem.

4 NIST submissions, 0 survivors: all withdrawn/broken.

Inherent problem with metric.

Hash-and-sign: disjoint “balls” don’t cover space.

Fiat-Shamir: “sparse” masking vector doesn’t hide secret.

Out of scope of these talks (but happy to discuss!).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 21 / 22

Page 96: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT ABOUT SIGNATURES?

Long time standing open problem.

4 NIST submissions, 0 survivors: all withdrawn/broken.

Inherent problem with metric.

Hash-and-sign: disjoint “balls” don’t cover space.

Fiat-Shamir: “sparse” masking vector doesn’t hide secret.

Out of scope of these talks (but happy to discuss!).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 21 / 22

Page 97: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT ABOUT SIGNATURES?

Long time standing open problem.

4 NIST submissions, 0 survivors: all withdrawn/broken.

Inherent problem with metric.

Hash-and-sign: disjoint “balls” don’t cover space.

Fiat-Shamir: “sparse” masking vector doesn’t hide secret.

Out of scope of these talks (but happy to discuss!).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 21 / 22

Page 98: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT ABOUT SIGNATURES?

Long time standing open problem.

4 NIST submissions, 0 survivors: all withdrawn/broken.

Inherent problem with metric.

Hash-and-sign: disjoint “balls” don’t cover space.

Fiat-Shamir: “sparse” masking vector doesn’t hide secret.

Out of scope of these talks (but happy to discuss!).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 21 / 22

Page 99: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

WHAT ABOUT SIGNATURES?

Long time standing open problem.

4 NIST submissions, 0 survivors: all withdrawn/broken.

Inherent problem with metric.

Hash-and-sign: disjoint “balls” don’t cover space.

Fiat-Shamir: “sparse” masking vector doesn’t hide secret.

Out of scope of these talks (but happy to discuss!).

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 21 / 22

Page 100: Code-based Cryptography: State of the Art - Part I...Isogeny-based cryptography. EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 4 / 22 Part II INTRO: A BIT OF BACKGROUND

See you tomorrow!

EDOARDO PERSICHETTI FLORIDA ATLANTIC UNIVERSITY 18 MARCH 2019 22 / 22


Recommended