Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

Full metadata record
DC Field Value Language
dc.contributor.authorPark, ByeongGyu-
dc.contributor.authorKim, Suhri-
dc.contributor.authorHong, Seokhie-
dc.contributor.authorKim, HeeSeok-
dc.contributor.authorSeo, Seog Chung-
dc.date.accessioned2021-08-31T08:41:20Z-
dc.date.available2021-08-31T08:41:20Z-
dc.date.created2021-06-19-
dc.date.issued2020-03-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/57426-
dc.description.abstractBeginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems has been challenged many times, although some of the variants have remained secure. However, recent studies on code-based cryptography have focused on the side-channel resistance since previous studies have indicated that the existing algorithms were vulnerable to side-channel analysis. In this paper, we propose the first side-channel attack on the Hybrid McEliece Scheme (HyMES) using only a single power consumption trace. HyMES is a variant of the McEliece system that provides smaller keys, along with faster encryption and decryption speed. By exploiting joint distributions of nonlinear functions in the decryption process, we were able to recover the private key of HyMES. To the best of our knowledge, this is the first work proposing a side-channel analysis based on a joint distribution of the leakages on the public-key system.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.subjectATTACK-
dc.titleSingle Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.contributor.affiliatedAuthorKim, HeeSeok-
dc.identifier.doi10.3390/app10051831-
dc.identifier.scopusid2-s2.0-85082083358-
dc.identifier.wosid000525298100279-
dc.identifier.bibliographicCitationAPPLIED SCIENCES-BASEL, v.10, no.5-
dc.relation.isPartOfAPPLIED SCIENCES-BASEL-
dc.citation.titleAPPLIED SCIENCES-BASEL-
dc.citation.volume10-
dc.citation.number5-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordPlusATTACK-
dc.subject.keywordAuthorMcEliece-
dc.subject.keywordAuthorHyMES-
dc.subject.keywordAuthorside-channel analysis-
dc.subject.keywordAuthorcode-based cryptosystem-
dc.subject.keywordAuthorjoint distribution-
dc.subject.keywordAuthorsingle trace analysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles
Graduate School > Department of Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE