Skip to content

Attack against NIST PQC candidate eMLE-Sign 2.0

Notifications You must be signed in to change notification settings

mti/attack_emle

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

Attack on NIST candidate signature eMLE-Sig 2.0

This repository contains example code to demonstrate the attack on eMLE-Sig 2.0 described in this official comment on the pqc-forum mailing list.

The attack is mounted against the C reference implementation of eMLE-Sig 2.0, and targets the n = 64 parameter set, claimed to reach NIST Level-I security.

With the notation of the eMLE-Sig 2.0 specification, this attack recovers the vector $\mathbf{z} \otimes \mathbf{x}_1$ from sufficiently many valid signatures on arbitrary messages, where $\mathbf{x}_1$ is (half of) the signing key, and $\mathbf{z} = (1,-1,0,0,\ldots,0)$.

Note that once we know this value, there are only at most 9 choices left for $\mathbf{x}_1$, and moreover the exact same approach also works for $\mathbf{x}_2$, so this is effectively a full key recovery attack.

To build and run the attack:

cd eMLE-Sig-I
make test_attack
./test_attack 1000000  #run the attack with 1,000,000 signature samples
./test_attack          #run the attack with the default number of samples (2,500,000)

Remarks

  • The exact same attack is expected to break all parameter sets, not just level-I. Corresponding experiments are forthcoming.

—Mehdi Tibouchi, July 20, 2023.

About

Attack against NIST PQC candidate eMLE-Sign 2.0

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published