Abstract
In this paper we describe attacks on the UOV-based signature scheme called MQ-Sign. MQ-Sign was submitted by Shim, Kim, and An as a first-round candidate for standardization in the (South) Korean post-quantum cryptography competition (KpqC). The scheme makes use of sparseness of the secret central polynomials and equivalent key construction to reduce the size of the private key. The authors propose four variants exploiting different levels of sparsity, MQ-Sign-SS, MQ-Sign-RS, MQ-Sign-SR, and MQ-Sign-RR with the last one being the standard UOV signature scheme.
We show that apart from the MQ-Sign-RR variant, all the others are insecure. Namely, we present a polynomial-time key-recovery attack on the variants MQ-Sign-SS and MQ-Sign-RS and a forgery attack on the variant MQ-Sign-SR below the claimed security level. Our attack exploits exactly the techniques used for reduction of keys - the sparsity of the central polynomials in combination with the specific structure of the secret linear map S.
We provide a verification script for the polynomial-time key-recovery attack, that recovers the secret key in less than seven seconds for security level V. Furthermore, we provide an implementation of the non-guessing part of the forgery attack, confirming our complexity estimates.
We show that apart from the MQ-Sign-RR variant, all the others are insecure. Namely, we present a polynomial-time key-recovery attack on the variants MQ-Sign-SS and MQ-Sign-RS and a forgery attack on the variant MQ-Sign-SR below the claimed security level. Our attack exploits exactly the techniques used for reduction of keys - the sparsity of the central polynomials in combination with the specific structure of the secret linear map S.
We provide a verification script for the polynomial-time key-recovery attack, that recovers the secret key in less than seven seconds for security level V. Furthermore, we provide an implementation of the non-guessing part of the forgery attack, confirming our complexity estimates.
| Original language | English |
|---|---|
| Title of host publication | Post-Quantum Cryptography |
| Subtitle of host publication | 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II |
| Editors | Markku-Juhani Saarinen, Daniel Smith-Tone |
| Place of Publication | Cham |
| Publisher | Springer |
| Pages | 168-185 |
| Number of pages | 18 |
| ISBN (Electronic) | 978-3-031-62746-0 |
| ISBN (Print) | 978-3-031-62745-3 |
| DOIs | |
| Publication status | Published - 11 Jun 2024 |
| Event | 15th International Workshop Post-Quantum Cryptography, PQCrypto 2024 - Oxford, United Kingdom Duration: 12 Jun 2024 → 14 Jun 2024 |
Publication series
| Name | Lecture Notes in Computer Science (LNCS) |
|---|---|
| Volume | 14772 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 15th International Workshop Post-Quantum Cryptography, PQCrypto 2024 |
|---|---|
| Abbreviated title | PQCrypto 2024 |
| Country/Territory | United Kingdom |
| City | Oxford |
| Period | 12/06/24 → 14/06/24 |
Fingerprint
Dive into the research topics of 'Practical key-recovery attack on MQ-Sign and more'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver