2010
DOI: 10.1007/978-3-642-12929-2_8
|View full text |Cite
|
Sign up to set email alerts
|

A Timing Attack against the Secret Permutation in the McEliece PKC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
43
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 42 publications
(43 citation statements)
references
References 14 publications
0
43
0
Order By: Relevance
“…This work extends on the analysis given in [11] in multiple ways: first of all, we find that a control flow ambiguity causing leakage in terms of the linear equations is manifest already in the syndrome inversion preceding the solving of the key equation in the decryption operation, and consequently the countermeasure proposed in that work is insufficient. We also show that there exists a timing side channel vulnerability in the syndrome inversion that allows the attacker to gain knowledge of the zero-element of the secret support.…”
Section: Introductionmentioning
confidence: 61%
See 4 more Smart Citations
“…This work extends on the analysis given in [11] in multiple ways: first of all, we find that a control flow ambiguity causing leakage in terms of the linear equations is manifest already in the syndrome inversion preceding the solving of the key equation in the decryption operation, and consequently the countermeasure proposed in that work is insufficient. We also show that there exists a timing side channel vulnerability in the syndrome inversion that allows the attacker to gain knowledge of the zero-element of the secret support.…”
Section: Introductionmentioning
confidence: 61%
“…Table 1 The control flow for the second EEA invocation, i.e. the solving of the key equation, for the case w = 4 has been analyzed in [11], there it is shown that in the case of σ 3 = 0 the number of iterations N is zero, whereas in the case σ 3 = 0 it is one. In that work, a countermeasure is proposed that removes the possibility to exploit the according timing differences in the second EEA invocation.…”
Section: Linear Equations From W = 4 Error Vectorsmentioning
confidence: 99%
See 3 more Smart Citations