Code-based Cryptography: Attacking and Constructing Cryptographic Systems
(2025) In Series of licentiate and doctoral theses- Abstract
- This thesis discusses novel results in the area of code-based cryptography, ranging from cryptanalyses on several code-based cryptographic constructions to proposing a code-based authentication scheme based on a novel Syndrome Decoding variant.
To address the looming threat of large-scale quantum computers that would
break many widely-used public-key cryptosystems, the National Institute of Stan-
dards and Technology (NIST), in 2016, promptly called for new quantum-resistant
cryptographic standards. After several comprehensive evaluation stages, several algorithms were chosen as the way forward. Recently, in 2022, “NIST expressed
particular interest in additional general-purpose signature schemes based on a... (More) - This thesis discusses novel results in the area of code-based cryptography, ranging from cryptanalyses on several code-based cryptographic constructions to proposing a code-based authentication scheme based on a novel Syndrome Decoding variant.
To address the looming threat of large-scale quantum computers that would
break many widely-used public-key cryptosystems, the National Institute of Stan-
dards and Technology (NIST), in 2016, promptly called for new quantum-resistant
cryptographic standards. After several comprehensive evaluation stages, several algorithms were chosen as the way forward. Recently, in 2022, “NIST expressed
particular interest in additional general-purpose signature schemes based on a security assumption that did not use structured lattices as well as signature schemes with short signatures and fast verification...” [NIS22]. This process reignited the competition, introducing many interesting and novel proposals.
Code-based cryptography has been pivotal in both processes, being the secu-
rity keystone for many proposals, particularly in the selected HQC algorithm. Its strong track record of research offers strong confidence in code-based cryptosys-
tems. From a complexity theory point of view, code-based assumptions are often
N P-hard computational problems, which have been the staples for provably-secured systems. On the other hand, cryptanalysis algorithms have witnessed
significant advancements, employing increasingly more sophisticated techniques. Yet, the fundamental Syndrome Decoding Problem remains resistant, suggesting that code-based cryptography is an exceptionally well-founded and dependable tool.
Many variants/alternatives of the Syndrome Decoding Problem have been
put forward to offer better performance without compromising security. Specifi-
cally, in this thesis, one encounters the Learning Parity with Noise (LPN) and Re-
stricted Syndrome Decoding Problem (RSDP). LPN has been a notable candidate in lightweight cryptography, and RSDP has gained traction due to its appearance in CROSS- a remaining candidate in the Round-2 of NIST Additional Digital Signa-
ture Schemes. Code-based cryptography, as a research field, shows immense versatility and richness far beyond its origin as a PKE proposed by McEliece [McE78].
We analyze several lightweight code-based cryptosystems in the first three
works, ranging from stream ciphers to wPRFs and authentication protocols. We
investigate the design weaknesses that allow us to launch attacks using various techniques. In particular, we analyze a novel LPN-based stream cipher called Firekite, a wPRFs construction, and an HB-like authentication protocol named LCMQ. Using diverse techniques in conjunction with information-set decoding algorithms (ISD), our studies improve previous results (if any) and impose stronger security parameters for said constructions.
Then, we draw connections between lattice-solving algorithms and traditional
syndrome decoding algorithms with our new proposal: a sieving-style ISD algorithm. Our algorithm offers a novel time-memory trade-off in solving relevant code-based parameters. In the low error-weight regime, the sieving-style ISD can use memory more efficiently without losing its competitiveness in computational performance. Thus, we introduce a valuable and practical alternative to cryptanalysis.
The last two papers look at the novel RSDP problem from a new perspective
- the Oracle model, analogous to the LWE or LPN problems. We construct an
HB-like authentication protocol, replacing the LPN problem with the (Oracle)
RSDP problem, showing its remarkable adaptiveness to the most secure designs.
In practice, RSDP structures allow incredibly efficient operations, rivaling those
of LPN. Moreover, RSDP also achieves high-security guarantees with modest pa-
rameters, yielding significant superiority regarding communication cost. Finally,
we expand the cryptanalysis of the RSDP problem, especially when many RSDP
samples are allowed with a BKW-style solver. We analyze the concrete complexity of RSDP in new regimes outside of CROSS parameters. Hence, our work is a useful calibrating tool for similar RSDP-based cryptosystems in the future. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/dfc45765-af41-4513-8245-ac9782435740
- author
- Nguyen, Vu
LU
- supervisor
-
- Thomas Johansson LU
- Qian Guo LU
- opponent
-
- Ass. Prof. Samardjiska, Simona, Radboud University, The Netherlands.
- organization
- publishing date
- 2025-05-14
- type
- Thesis
- publication status
- published
- in
- Series of licentiate and doctoral theses
- issue
- 186
- pages
- 244 pages
- publisher
- The Department of Electrical and Information Technology
- defense location
- Lecture Hall E:1406, building E, Ole Römers väg 3, Faculty of Engineering LTH, Lund University, Lund.
- defense date
- 2025-06-12 09:15:00
- ISBN
- 978-91-8104-524-6
- 978-91-8104-523-9
- project
- Secure and private connectivity in smart enviroments (SURPRISE)
- language
- English
- LU publication?
- yes
- id
- dfc45765-af41-4513-8245-ac9782435740
- date added to LUP
- 2025-05-14 11:31:32
- date last changed
- 2025-05-14 15:03:14
@phdthesis{dfc45765-af41-4513-8245-ac9782435740, abstract = {{This thesis discusses novel results in the area of code-based cryptography, ranging from cryptanalyses on several code-based cryptographic constructions to proposing a code-based authentication scheme based on a novel Syndrome Decoding variant.<br/><br/>To address the looming threat of large-scale quantum computers that would<br/>break many widely-used public-key cryptosystems, the National Institute of Stan-<br/>dards and Technology (NIST), in 2016, promptly called for new quantum-resistant<br/>cryptographic standards. After several comprehensive evaluation stages, several algorithms were chosen as the way forward. Recently, in 2022, “NIST expressed<br/>particular interest in additional general-purpose signature schemes based on a security assumption that did not use structured lattices as well as signature schemes with short signatures and fast verification...” [NIS22]. This process reignited the competition, introducing many interesting and novel proposals.<br/><br/>Code-based cryptography has been pivotal in both processes, being the secu-<br/>rity keystone for many proposals, particularly in the selected HQC algorithm. Its strong track record of research offers strong confidence in code-based cryptosys-<br/>tems. From a complexity theory point of view, code-based assumptions are often<br/>N P-hard computational problems, which have been the staples for provably-secured systems. On the other hand, cryptanalysis algorithms have witnessed<br/>significant advancements, employing increasingly more sophisticated techniques. Yet, the fundamental Syndrome Decoding Problem remains resistant, suggesting that code-based cryptography is an exceptionally well-founded and dependable tool.<br/>Many variants/alternatives of the Syndrome Decoding Problem have been<br/>put forward to offer better performance without compromising security. Specifi-<br/>cally, in this thesis, one encounters the Learning Parity with Noise (LPN) and Re-<br/>stricted Syndrome Decoding Problem (RSDP). LPN has been a notable candidate in lightweight cryptography, and RSDP has gained traction due to its appearance in CROSS- a remaining candidate in the Round-2 of NIST Additional Digital Signa-<br/>ture Schemes. Code-based cryptography, as a research field, shows immense versatility and richness far beyond its origin as a PKE proposed by McEliece [McE78].<br/>We analyze several lightweight code-based cryptosystems in the first three<br/>works, ranging from stream ciphers to wPRFs and authentication protocols. We<br/>investigate the design weaknesses that allow us to launch attacks using various techniques. In particular, we analyze a novel LPN-based stream cipher called Firekite, a wPRFs construction, and an HB-like authentication protocol named LCMQ. Using diverse techniques in conjunction with information-set decoding algorithms (ISD), our studies improve previous results (if any) and impose stronger security parameters for said constructions.<br/>Then, we draw connections between lattice-solving algorithms and traditional<br/>syndrome decoding algorithms with our new proposal: a sieving-style ISD algorithm. Our algorithm offers a novel time-memory trade-off in solving relevant code-based parameters. In the low error-weight regime, the sieving-style ISD can use memory more efficiently without losing its competitiveness in computational performance. Thus, we introduce a valuable and practical alternative to cryptanalysis.<br/>The last two papers look at the novel RSDP problem from a new perspective<br/>- the Oracle model, analogous to the LWE or LPN problems. We construct an<br/>HB-like authentication protocol, replacing the LPN problem with the (Oracle)<br/>RSDP problem, showing its remarkable adaptiveness to the most secure designs.<br/>In practice, RSDP structures allow incredibly efficient operations, rivaling those<br/>of LPN. Moreover, RSDP also achieves high-security guarantees with modest pa-<br/>rameters, yielding significant superiority regarding communication cost. Finally,<br/>we expand the cryptanalysis of the RSDP problem, especially when many RSDP<br/>samples are allowed with a BKW-style solver. We analyze the concrete complexity of RSDP in new regimes outside of CROSS parameters. Hence, our work is a useful calibrating tool for similar RSDP-based cryptosystems in the future.}}, author = {{Nguyen, Vu}}, isbn = {{978-91-8104-524-6}}, language = {{eng}}, month = {{05}}, number = {{186}}, publisher = {{The Department of Electrical and Information Technology}}, school = {{Lund University}}, series = {{Series of licentiate and doctoral theses}}, title = {{Code-based Cryptography: Attacking and Constructing Cryptographic Systems}}, url = {{https://lup.lub.lu.se/search/files/219155690/dissertation_VU_Final.pdf}}, year = {{2025}}, }