Show simple item record

dc.contributor.authorLau, TSC
dc.contributor.authorKamel Ariffin, MR
dc.contributor.authorYip, S-C
dc.contributor.authorChin, J-J
dc.contributor.authorTing, C-Y
dc.date.accessioned2024-05-01T10:32:22Z
dc.date.available2024-05-01T10:32:22Z
dc.date.issued2024-01-30
dc.identifier.issn2405-8440
dc.identifier.issn2405-8440
dc.identifier.othere24185
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/22378
dc.description.abstract

In recent research, Durandal, a signature scheme based on rank metrics following Schnorr's approach, was introduced to conceal secret key information by selectively manipulating the vector subspace of signatures. Later, an enhancement, namely the SHMW signature scheme, with smaller keys and signatures while maintaining EUF-CMA security, was proposed. Both Durandal and SHMW require adversaries to solve hard problems (i.e., Rank Support Learning, Rank Syndrome Decoding, and Affine Rank Syndrome Decoding) for secret key retrieval, in which the parameters are designed to withstand at least 128-bit computational complexity. The authors claimed that the security of the SHMW scheme is deemed superior to that of the original Durandal scheme. In this paper, we introduce a novel approach to identifying weak keys within the Durandal framework to prove the superiority of the SHMW scheme. This approach exploits the extra information in the signature to compute an intersection space that contains the secret key. Consequently, a cryptanalysis of the SHMW signature scheme was carried out to demonstrate the insecurity of the selected keys within the SHWM scheme. In particular, we proposed an algorithm to recover an extended support that contains the secret key used in the signature schemes. Applying our approach to the SHMW scheme, we can recover its secret key with only 97-bit complexity, although it was claimed that the proposed parameters achieve a 128-bit security level. The results of our proposed approaches show that the security level of the SHMW signature scheme is inferior compared to that of the original Durandal scheme.

dc.format.extente24185-e24185
dc.format.mediumElectronic-eCollection
dc.languageen
dc.publisherElsevier BV
dc.subjectCode-based cryptography
dc.subjectDigital signatures
dc.subjectKey recovery attack
dc.subjectPost-quantum cryptography
dc.subjectRank metric
dc.titleCryptanalysis of the SHMW signature scheme
dc.typejournal-article
dc.typeJournal Article
plymouth.author-urlhttps://www.ncbi.nlm.nih.gov/pubmed/38298683
plymouth.issue2
plymouth.volume10
plymouth.publisher-urlhttp://dx.doi.org/10.1016/j.heliyon.2024.e24185
plymouth.publication-statusPublished
plymouth.journalHeliyon
dc.identifier.doi10.1016/j.heliyon.2024.e24185
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Current Academic staff
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
plymouth.organisational-group|Plymouth|REF 2029 Researchers by UoA
plymouth.organisational-group|Plymouth|REF 2029 Researchers by UoA|UoA11 Computer Science and Informatics
dc.publisher.placeEngland
dcterms.dateAccepted2024-01-04
dc.date.updated2024-05-01T10:32:21Z
dc.rights.embargodate2024-5-2
dc.identifier.eissn2405-8440
dc.rights.embargoperiod
rioxxterms.versionofrecord10.1016/j.heliyon.2024.e24185


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV