Side channels in the McEliece PKC

Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

59 Scopus citations

Abstract

The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computers because no efficient quantum algorithm is known for the underlying problems, which this cryptosystem is built upon. As we show in this paper, a straightforward implementation of this system may feature several side channels. Specifically, we present a Timing Attack which was executed successfully against a software implementation of the McEliece PKC. Furthermore, the critical system components for key generation and decryption are inspected to identify channels enabling power and cache attacks. Implementation aspects are proposed as countermeasures to face these attacks.

Original languageBritish English
Title of host publicationPost-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings
PublisherSpringer Verlag
Pages216-229
Number of pages14
ISBN (Print)3540884025, 9783540884026
DOIs
StatePublished - 2008
Event2nd International Workshop on Post-Quantum Cryptography, PQCrypto 2008 - Cincinnati, OH, United States
Duration: 17 Oct 200819 Oct 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5299 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Workshop on Post-Quantum Cryptography, PQCrypto 2008
Country/TerritoryUnited States
CityCincinnati, OH
Period17/10/0819/10/08

Keywords

  • Post quantum cryptography
  • Side channel attack
  • Timing attack

Fingerprint

Dive into the research topics of 'Side channels in the McEliece PKC'. Together they form a unique fingerprint.

Cite this