Skip to main navigation Skip to search Skip to main content

An efficient structural attack on NIST submission DAGS

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present an efficient key recovery attack on code based encryption schemes using some quasi-dyadic alternant codes with extension degree 2. This attack permits to break the proposal DAGS recently submitted to NIST.

Original languageEnglish
Title of host publicationAdvances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsThomas Peyrin, Steven Galbraith
PublisherSpringer Verlag
Pages93-118
Number of pages26
ISBN (Print)9783030033255
DOIs
Publication statusPublished - 1 Jan 2018
Event24th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2018 - Brisbane, Australia
Duration: 2 Dec 20186 Dec 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11272 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference24th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2018
Country/TerritoryAustralia
CityBrisbane
Period2/12/186/12/18

Keywords

  • Alternant codes
  • Code-based cryptography
  • Key recovery attack
  • McEliece encryption scheme
  • Quasi-dyadic codes
  • Schur product of codes

Fingerprint

Dive into the research topics of 'An efficient structural attack on NIST submission DAGS'. Together they form a unique fingerprint.

Cite this