In this work we present an efficient implementation of the Hybrid Encryption scheme based on the Niederreiter PCKS proposed by E. Persichetti. To achieve IND-CCA2 security (in the random oracle model), we use an HMAC function of the message and the symmetric key, and then apply AES128-CBC as the data encapsulation part of this hybrid scheme. The HMAC function is based on SHA3-512. In addition, we introduce a modification in the decapsulation algorithm, to resist a reaction attack first proposed by Bernstein et al. The implementation is done in C on Intel core i3 CPU and 4 GB RAM and 64 bit OS. The code is running Debian/Linux 3.5.2, where the source has been compiled with gcc 4.7.
Efficient implementation of hybrid encryption from coding theory / Cayrel, P. -L.; Gueye, C. T.; Mboup, E. H. M.; Ndiaye, O.; Persichetti, E.. - (2017), pp. 254-264. - LECTURE NOTES IN COMPUTER SCIENCE. [10.1007/978-3-319-55589-8_17].
Efficient implementation of hybrid encryption from coding theory
Persichetti E.
2017
Abstract
In this work we present an efficient implementation of the Hybrid Encryption scheme based on the Niederreiter PCKS proposed by E. Persichetti. To achieve IND-CCA2 security (in the random oracle model), we use an HMAC function of the message and the symmetric key, and then apply AES128-CBC as the data encapsulation part of this hybrid scheme. The HMAC function is based on SHA3-512. In addition, we introduce a modification in the decapsulation algorithm, to resist a reaction attack first proposed by Bernstein et al. The implementation is done in C on Intel core i3 CPU and 4 GB RAM and 64 bit OS. The code is running Debian/Linux 3.5.2, where the source has been compiled with gcc 4.7.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.