We present a key-recovery fault injection attack on the Classic McEliece Key Encapsulation Mechanism (KEM). The fault injections target the error-locator polynomial of the Goppa code and the validity checks in the decryption algorithm, making a chosen ciphertext attack possible. Faulty decryption outputs are used to generate a system of polynomial equations in the secret support elements of the Goppa code. After solving the equations, we can determine a suitable Goppa polynomial and form an alternative secret key. To demonstrate the feasibility of the attack on hardware, we simulate the fault injections on virtual prototypes of two RISC-V cores at register-transfer level
Cryptography is one of the most important tools nowadays. We use it in order to provide as much secr...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem bas...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
Code-based public-key cryptosystems are promising candidates for standardization as quantum-resistan...
International audienceThe McEliece and the Niederreiter public key cryptosystems (PKC) are supposed ...
International audienceThe McEliece and the Niederreiter public key cryptosystems (PKC) are supposed ...
tems (PKC) are presumed secure in a post quantum world [4] because there is no efficient quantum alg...
International audience—In this paper, based on a thorough analysis of the state of the art, we point...
International audience—In this paper, based on a thorough analysis of the state of the art, we point...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
Cryptography is one of the most important tools nowadays. We use it in order to provide as much secr...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem bas...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
Code-based public-key cryptosystems are promising candidates for standardization as quantum-resistan...
International audienceThe McEliece and the Niederreiter public key cryptosystems (PKC) are supposed ...
International audienceThe McEliece and the Niederreiter public key cryptosystems (PKC) are supposed ...
tems (PKC) are presumed secure in a post quantum world [4] because there is no efficient quantum alg...
International audience—In this paper, based on a thorough analysis of the state of the art, we point...
International audience—In this paper, based on a thorough analysis of the state of the art, we point...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
Cryptography is one of the most important tools nowadays. We use it in order to provide as much secr...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem bas...