Post-quantum cryptography: Code-based cryptography

One option is to use error correction codes as a cryptographic primitive.
The basics Error correction codes are digital codes used to reliably send data through an unreliable channel.
In a noisy channel, corruption of some of the bits would yield an invalid code word, so the error is detected.
If the space between code words is big enough, a reasonable guess can be made about which code word was probably corrupted and the error can be corrected.
Error values purposefully introduced in encryption schemes usually choose Hamming weights large enough to be secure and small enough to be corrected.
W = a. G. Generators are created by concatenating two arrays: I, which is a square matrix with ones in the diagonal and zeros everywhere else and P which has the error coding values.
In addition if s is non-zero and the error in w' is small enough you can use s to recover the error where w' = w + e, and thus the original w = w' + e. Unfortunately, in the general case, mapping s to e involves trying all possible errors and calculating their expected s values, storing them in a table, then looking up the error from the table using s. If you select H carefully you can create a function which gives you e from s directly.
Once you have the error, you can calculate the correct w, and then recover a. This means we can create a function Dg based on H, which will take a corrupted w' and give us the original a. Efficient mapping syndromes to errors Hamming codes There are several schemes which are used to build H in such a way that we can calculate the error from the syndrome efficiently.
These are called Hamming codes and they are popular because they are easy to implement for both encoding and error correction.
They are not the most efficient encoding scheme for correcting multibit errors with the minimum size code word, however.
Goppa codes Goppa codes were developed to give the most efficient mapping of maximum correctable error versus smallest size difference between w and a. The scheme involves picking several base values and functions and building up H from powers of those values multiplied by polynomials of these functions.
To find the error, the syndrome is turned into a polynomial, then that polynomial is processed into an oracle function.
The oracle function can be queried for each bit of the error to determine whether it is 1 or zero.
The idea is that because the density of 1s in the parity check matrix is small, the connections between the error bits and syndrome bits are small.
This fact can be used to create probabilistic algorithms for picking likely error bits by walking down each error bit and seeing how likely that error bit would be one or zero based on the connection this error bit has to the syndrome bits, and the value of the connected syndrome bits.
Calculate m= Dg(cPr-1)S-1 The arrays S and Pr hide the details of our original matrix G so the attacker doesn't know H and thus can't perform the Goppa algorithm to recover the error.
Other error correcting code schemes have been proposed to replace Goppa codes in the McEliece scheme.
Attempts at making a signature scheme based on error correcting codes have also been broken.
G is public and anyone can use G to recover the original message as long as the error bits are small enough.
The hamming weights of x, y, r1, r2, and e are chosen so that the error xr2-r1y+e is below the decoding threshold and m should be recovered.


This Cyber News was published on www.redhat.com. Publication date: Sat, 29 Jun 2024 09:13:06 +0000


Cyber News related to Post-quantum cryptography: Code-based cryptography

Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
1 month ago Aws.amazon.com
DORA and your quantum-safe cryptography migration - Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. New requirements for financial entities in the EU. DORA lays out a set of requirements across ICT risk management, incident ...
9 months ago Securityintelligence.com
IBM Heron Quantum Chip, Quantum System Two - Next generation quantum processor dubbed 'Heron', and the modular IBM Quantum System Two unveiled by Big Blue. IBM has unveiled two new quantum developments, with a new series of utility-scale processors housed within a modular quantum system. At its ...
11 months ago Silicon.co.uk
Quantum computing: The data security conundrum - One of the biggest challenges of digital technology today is around security systems and data. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional ...
8 months ago Itsecurityguru.org
Post-Quantum Cryptography Alliance Launches to Advance Post-Quantum Cryptography - PRESS RELEASE. SAN FRANCISCO, Feb. 6, 2024 /PRNewswire/ - The Linux Foundation is excited to announce the launch of the Post-Quantum Cryptography Alliance, an open and collaborative initiative to drive the advancement and adoption of post-quantum ...
9 months ago Darkreading.com
Quantum computing will enable a safer, more secure world - Today's media narrative around quantum computing's role in cybersecurity is overwhelmingly negative, because quantum computers will render today's encryption standards redundant, leaving much of our data at risk of being decoded. First, it's ...
10 months ago Cybersecurity-insiders.com
Getting your organisation post-quantum ready - While quantum computing is still very much in its early stages, it's important that companies are already thinking about this evolving technology - and more importantly implementing and stress testing much needed solutions suitable for a post-quantum ...
11 months ago Cybersecurity-insiders.com
Safeguard Your Network in a Post-Quantum World - There is an imminent threat to existing cryptography with the advent of quantum computers. A quantum computer works with qubits, which can exist in multiple states simultaneously, based on the quantum mechanical principle of superposition. Thus, a ...
9 months ago Feedpress.me
It's time to bolster defenses for an AI / Quantum Future - The rapid advances we are seeing in emerging technologies like AI, ML and quantum computing will have a devastating impact on organizations not prepared and who have not considered updating existing modes of asymmetric data encryption. Quantum is ...
8 months ago Cybersecurity-insiders.com
Tech Giants Form Post-Quantum Cryptography Alliance - The Linux Foundation today announced the launch of the Post-Quantum Cryptography Alliance, an initiative to advance and drive the adoption of post-quantum cryptography. Founded by AWS, Cisco, IBM, IntellectEU, Nvidia, QuSecure, SandboxAQ, and the ...
9 months ago Securityweek.com
What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future - Cryptography has long been essential in ensuring the protection of data and communication networks. Remaining reliant on outdated cryptographic standards certainly adds to the dangers of compromise. As we usher in an era of cloud-scaling and quantum ...
7 months ago Cyberdefensemagazine.com
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
10 months ago Securityboulevard.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
4 months ago Helpnetsecurity.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
4 months ago Helpnetsecurity.com
How Communications Companies Can Prepare for Q-Day - After a grueling eight years of testing, the National Institute of Standards and Technology (NIST) has finalized the first three algorithms that will form the backbone of the world's strategy to counter the potential threats of quantum ...
1 month ago Darkreading.com
RSAC panel debates confidence in post-quantum cryptography - Lattice-based cryptography is a proposed answer to the post-quantum cryptography dilemma, but a recently published paper cast doubt on this theory. While it appears to be a false alarm, experts were left questioning their confidence in PQC efforts. ...
5 months ago Techtarget.com
Breakthrough promises secure quantum computing at home - The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough by scientists at Oxford University Physics guaranteeing security and privacy. This advance promises to ...
6 months ago Sciencedaily.com
China plans to take 'hack-proof' quantum satellite technology to new heights - China is planning new, cutting-edge quantum communications satellites. China launched the first dedicated quantum communications satellite, named Micius, in 2016, and has been quietly working on followup missions in the years since. "Low Earth orbit ...
11 months ago Space.com
The Impacts of Quantum Computing on Cryptocurrency in 2023 - The development of quantum computers has caused a lot of concern in the security world, as they are believed to be able to crack current public key encryption (PKI) in a relatively short amount of time. This is known as the cryptopocalypse, and it is ...
1 year ago Securityweek.com
Google's Post-Quantum Upgrade Doesn't Mean We're All Protected Yet - Google's announcement was the product of a long chain of events, triggered by NIST choosing Kyber as the candidate for general encryption last year. As a result, Google has announced that it has added Kyber, beginning with version 116 of its Chrome ...
7 months ago Darkreading.com
Satellites for quantum communications - Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To safeguard communications over long distances, the QUICK³ space ...
7 months ago Sciencedaily.com
Accenture and SandboxAQ Collaborate to Help Organizations Protect Data - PRESS RELEASE. NEW YORK; Jan. 16, 2024 - Accenture and SandboxAQ are partnering to deliver artificial intelligence and quantum computing solutions to help organizations identify and remediate cybersecurity vulnerabilities. According to recent ...
9 months ago Darkreading.com
Adapting cybersecurity for the quantum computing era - Researchers are exploring promising quantum computing applications across various domains, from cryptography and optimization problems to drug discovery and artificial intelligence. The race to harness the power of quantum bits has sparked a wave of ...
10 months ago Helpnetsecurity.com
Implementation Flaws Identified in Post-Quantum Encryption Algorithm - Two implementation flaws have been identified in the Kyber key encapsulation mechanism, an encryption standard intended to safeguard networks from future attacks by quantum computers. The encryption standard Kyber key encapsulation mechanism, ...
9 months ago Cysecurity.news
SandboxAQ Joins the FIDO Alliance to Further Drive the Use of Secure Protocols instead of Passwords - SandboxAQ has announced its membership in the FIDO Alliance, an open industry consortium focused on minimizing the world's dependence on passwords-a prevalent source of security and usability problems. By joining forces with prominent FIDO Alliance ...
4 months ago Itsecurityguru.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)