A Timing Attack against the Secret Permutation in the McEliece PKC
- Cite this paper as:
- Strenzke F. (2010) A Timing Attack against the Secret Permutation in the McEliece PKC. In: Sendrier N. (eds) Post-Quantum Cryptography. PQCrypto 2010. Lecture Notes in Computer Science, vol 6061. Springer, Berlin, Heidelberg
In this work we present a novel timing attack against the McEliece public key cryptosystem (PKC). In contrast to former works investigating timing attacks that aim at recovering the message, we devise how to exploit a vulnerability in the Patterson algorithm that allows the attacker to gather information about the secret permutation through a timing side channel. This information can be used to dramatically reduce the cost of a brute force attack against the secret key. We also describe the results obtained from a proof of concept implementation of the attack and give an appropriate countermeasure.
Keywordsside channel attack timing attack post quantum cryptography code-based cryptography
Unable to display preview. Download preview PDF.