TY - GEN
T1 - CAKE
T2 - 16th IMA International Conference on Cryptography and Coding, IMACC 2017
AU - Barreto, Paulo S.L.M.
AU - Gueron, Shay
AU - Güneysu, Tim
AU - Misoczki, Rafael
AU - Persichetti, Edoardo
AU - Sendrier, Nicolas
AU - Tillich, Jean Pierre
N1 - Publisher Copyright: © 2017, Springer International Publishing AG.
PY - 2017
Y1 - 2017
N2 - Current widely-used key exchange (KE) mechanisms will be vulnerable to quantum attacks when sufficiently strong quantum computers become available. Therefore, devising quantum-resistant replacements that combine efficiency with solid security guarantees is an important and challenging task. This paper proposes several contributions towards this goal. First, we introduce “CAKE”, a key encapsulation algorithm based on the QC-MDPC McEliece encryption scheme, with two major improvements: (a) the use of ephemeral keys that defeats a recent reaction attack against MDPC decoding of the corresponding encryption scheme and (b) a highly efficient key generation procedure for QC-MDPC-based cryptosystems. Then, we present an authenticated key exchange protocol based on CAKE, which is suitable for the Internet Key Exchange (IKE) standard. We prove that CAKE is IND-CPA secure, that the protocol is SK-Secure, and suggest practical parameters. Compared to other post-quantum schemes, we believe that CAKE is a promising candidate for post-quantum key exchange standardization.
AB - Current widely-used key exchange (KE) mechanisms will be vulnerable to quantum attacks when sufficiently strong quantum computers become available. Therefore, devising quantum-resistant replacements that combine efficiency with solid security guarantees is an important and challenging task. This paper proposes several contributions towards this goal. First, we introduce “CAKE”, a key encapsulation algorithm based on the QC-MDPC McEliece encryption scheme, with two major improvements: (a) the use of ephemeral keys that defeats a recent reaction attack against MDPC decoding of the corresponding encryption scheme and (b) a highly efficient key generation procedure for QC-MDPC-based cryptosystems. Then, we present an authenticated key exchange protocol based on CAKE, which is suitable for the Internet Key Exchange (IKE) standard. We prove that CAKE is IND-CPA secure, that the protocol is SK-Secure, and suggest practical parameters. Compared to other post-quantum schemes, we believe that CAKE is a promising candidate for post-quantum key exchange standardization.
KW - Code-based cryptography
KW - Key exchange
KW - Post-quantum cryptography
UR - http://www.scopus.com/inward/record.url?scp=85038209127&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-71045-7_11
DO - 10.1007/978-3-319-71045-7_11
M3 - Conference contribution
SN - 9783319710440
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 207
EP - 226
BT - Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings
A2 - O’Neill, Maire
PB - Springer Verlag
Y2 - 12 December 2017 through 14 December 2017
ER -