Abstract
The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computers because no efficient quantum algorithm is known for the underlying problems, which this cryptosystem is built upon. As we show in this paper, a straightforward implementation of this system may feature several side channels. Specifically, we present a Timing Attack which was executed successfully against a software implementation of the McEliece PKC. Furthermore, the critical system components for key generation and decryption are inspected to identify channels enabling power and cache attacks. Implementation aspects are proposed as countermeasures to face these attacks.
Original language | English |
---|---|
Title of host publication | Post-Quantum Cryptography |
Subtitle of host publication | Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings |
Editors | Johannes A. Buchmann, Jintai Ding |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 216-229 |
Number of pages | 14 |
ISBN (Electronic) | 978-3-540-88403-3 |
ISBN (Print) | 978-3-540-88402-6 |
DOIs | |
Publication status | Published - 2008 |
Externally published | Yes |
Event | 2nd International Workshop on Post-Quantum Cryptography, PQCrypto 2008 - Cincinnati, United States Duration: 17 Oct 2008 → 19 Oct 2008 Conference number: 2 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 5299 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 2nd International Workshop on Post-Quantum Cryptography, PQCrypto 2008 |
---|---|
Abbreviated title | PQCrypto |
Country/Territory | United States |
City | Cincinnati |
Period | 17/10/08 → 19/10/08 |
Keywords
- Side channel attack
- Timing attack
- Post quantum cryptography