论文标题
自行车后量子后钥匙封装机制的弱键分析
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
论文作者
论文摘要
量子计算机的演变对当代公开加密(PKE)方案构成了严重威胁。为了解决这个即将到来的问题,国家标准技术研究所(NIST)目前正在进行量子后加密术(PQC)标准化项目,旨在评估并随后对合适的PQC计划进行标准化。一种这样的吸引人的方法,称为钻头钥匙封装(自行车),是在比赛的最后一轮中做出的。尽管具有一些吸引人的功能,但自行车的IND-CCA安全性取决于平均解码器故障率(DFR),其值更高的值可以促进特定类型的侧通道攻击。尽管自行车采用了可忽略不计的DFR的黑色灰色 - 叶片(BGF)解码器,但弱键对平均DFR的影响尚未得到充分研究。因此,在本文中,我们首先执行了自行车计划的实施,然后通过广泛的实验表明,弱者可能是对自行车方案的ind-CCA安全的潜在威胁,因此需要在标准化之前从研究社区中注意。我们还提出了一种钥匙检查算法,该算法可以潜在地补充自行车机制,并阻止用户生成和采用弱密钥来解决此问题。
The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum Cryptography (PQC) standardization project intending to evaluate and subsequently standardize the suitable PQC scheme(s). One such attractive approach, called Bit Flipping Key Encapsulation (BIKE), has made to the final round of the competition. Despite having some attractive features, the IND-CCA security of the BIKE depends on the average decoder failure rate (DFR), a higher value of which can facilitate a particular type of side-channel attack. Although the BIKE adopts a Black-Grey-Flip (BGF) decoder that offers a negligible DFR, the effect of weak-keys on the average DFR has not been fully investigated. Therefore, in this paper, we first perform an implementation of the BIKE scheme, and then through extensive experiments show that the weak-keys can be a potential threat to IND-CCA security of the BIKE scheme and thus need attention from the research community prior to standardization. We also propose a key-check algorithm that can potentially supplement the BIKE mechanism and prevent users from generating and adopting weak keys to address this issue.