Download now Free registration required
In this paper, the authors present new timing vulnerabilities that arise in the inversion of the error syndrome through the Extended Euclidean Algorithm that is part of the decryption operation of code-based Cryptosystems. They analyze three types of timing attack vulnerabilities theoretically and experimentally: the first allows recovery of the zero-element of the secret support, the second is a refinement of a previously described vulnerability yielding linear equations about the secret support, and the third enables to retrieve non-linear equations about the secret support. Furthermore, they analyze theoretically the limitations applying to actual attacks based on the information gained in such manner.
- Format: PDF
- Size: 369.43 KB