Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems

Anna-Lena Horlemann,Karan Khathuria,Marc Newman,Amin Sakzad,Carlos Vela Cabello
2024-10-15
Abstract:Post-quantum cryptography has gained attention due to the need for secure cryptographic systems in the face of quantum computing. Code-based and lattice-based cryptography are two prominent approaches, both heavily studied within the NIST standardization project. Code-based cryptography -- most prominently exemplified by the McEliece cryptosystem -- is based on the hardness of decoding random linear error-correcting codes. Despite the McEliece cryptosystem having been unbroken for several decades, it suffers from large key sizes, which has led to exploring variants using metrics than the Hamming metric, such as the Lee metric. This alternative metric may allow for smaller key sizes, but requires further analysis for potential vulnerabilities to lattice-based attack techniques. In this paper, we consider a generic Lee metric based McEliece type cryptosystem and evaluate its security against lattice-based attacks.
Cryptography and Security,Information Theory
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is to evaluate the security of the McEliece - type cryptosystem based on Lee metric when facing lattice - based attacks. Specifically, the researchers are concerned with: 1. **Reasons for introducing Lee metric**: Although the traditional McEliece cryptosystem based on Hamming metric is secure, it has the problem of overly large key size. Using Lee metric can potentially reduce the key size, but its vulnerability to lattice - based attacks needs further analysis. 2. **Evaluating security**: The paper evaluates the security of this new system by reducing the complexity of the coding problem based on Lee metric to known difficult problems in lattice theory, such as Bounded Distance Decoding problem (BDD), Lee Distance Decoding problem (LeeDP) and Unique Shortest Vector Problem (uSVP). 3. **Analyzing the feasibility of attacks under specific parameters**: The researchers also explore whether the techniques used in FuLeakage attacks can be applied to the cryptosystem based on Lee metric, and analyze the feasibility of these attacks under different parameter settings. ### Specific goals of the paper - **Establish complexity reduction**: Prove that there is a polynomial - time reduction between the decoding problem based on Lee metric (LeeDP) and the Bounded Distance Decoding problem (BDD) on the lattice basis. \[ \text{For any } t=\alpha \min\{q, d_L(C)\}\in \mathbb{Z} \text{ and } \alpha\in(0,1), \text{ there is a polynomial - time reduction from } LeeDP_t \text{ to } BDD_\alpha. \] - **Analyze the inclusion relationship of finite codewords in Construction A lattices**: Study the distribution of codewords in Construction A lattices to determine whether the codewords are mainly concentrated in sub - lattices of lower dimensions, thus affecting the complexity of attacks. - **Compare marginal distributions under different metrics**: By comparing the marginal distributions under Lee metric, Hamming metric, and \(\ell_1\) and \(\ell_2\) norms, evaluate the impact of different distributions on the cryptosystem. ### Main contributions - **Security evaluation framework**: Provide a security evaluation framework based on lattice theory for analyzing potential vulnerabilities of the cryptosystem based on Lee metric. - **Analysis of attack feasibility**: By extending FuLeakage attacks, analyze the feasibility of attacks on the cryptosystem based on Lee metric under specific parameters. - **Theoretical results**: Provide theoretical results on the distribution of Lee - metric codewords in Construction A lattices, providing a basis for further research. In summary, this paper aims to provide a comprehensive security evaluation framework for the cryptosystem based on Lee metric through strict mathematical analysis and complex reduction proofs, and reveal its potential weaknesses when facing lattice - based attacks.