Quantum-safe Encryption: A New Method to Reduce Complexity and/or Improve Security Level

Amir K. Khandani
2024-01-30
Abstract:This work presents some novel techniques to enhance an encryption scheme motivated by classical McEliece cryptosystem. Contributions include: (1) using masking matrices to hide sensitive data, (2) allowing both legitimate parties to incorporate randomness in the public key without sharing any additional public information, (3) using concatenation of a repetition code for error correction, permitting key recovery with a negligible decoding complexity, (4) making attacks more difficult by increasing the complexity in verifying a given key candidate has resulted in the actual key, (5) introducing memory in the error sequence such that: (i) error vector is composed of a random number of erroneous bits, (ii) errors can be all corrected when used in conjunction with concatenation of a repetition code of length 3. Proposed techniques allow generating significantly larger keys, at the same time, with a much lower complexity, as compared to known post-quantum key generation techniques relying on randomization.
Cryptography and Security,Information Theory
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to reduce complexity and improve security in post - quantum encryption technologies. Specifically, the author proposes several new techniques to enhance the encryption scheme based on the classical McEliece cryptosystem. The main contributions include: 1. **Hide sensitive data using a masking matrix**: By adding a random binary matrix (mask) to the generator matrix of the error - correcting code, the generator matrix is fundamentally changed, making the public key more resistant to attacks while reducing the complexity of key recovery and storage requirements. 2. **Allow both parties to introduce randomness in the public key**: The legitimate communicating parties (such as Alice and Bob) can introduce randomness in the public key without sharing additional public information. 3. **Use a repetition code for error correction**: By concatenating repetition codes of length 3, key recovery with low decoding complexity is achieved. 4. **Increase the difficulty of attacks**: By increasing the complexity of verifying whether a given key candidate is the actual key, attacks are made more difficult. 5. **Introduce memory in the error sequence**: The error vector consists of a random number of error bits, and these errors can be completely corrected, thus increasing the complexity of attacks while maintaining high security. The goal of these techniques is to generate significantly larger keys while reducing complexity, having an advantage over known post - quantum key generation techniques that rely on randomization.