In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to NIST’s standardization call for the key exchange/encryption functionalities. In particular, we modify the algorithms for key generation, encapsulation and decapsulation to fit an alternative KEM framework, and we present a new set of parameters that use binary codes. We discuss advantages and disadvantages for each of the variants proposed.

DAGS: Reloaded Revisiting Dyadic Key Encapsulation / Banegas, G.; Barreto, P. S. L. M.; Boidje, B. O.; Cayrel, P. -L.; Dione, G. N.; Gaj, K.; Gueye, C. T.; Haeussler, R.; Klamti, J. B.; N'Diaye, O.; Nguyen, D. T.; Persichetti, E.; Ricardini, J. E.. - (2019), pp. 69-85. - LECTURE NOTES IN COMPUTER SCIENCE. [10.1007/978-3-030-25922-8_4].

DAGS: Reloaded Revisiting Dyadic Key Encapsulation

Persichetti E.;
2019

Abstract

In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to NIST’s standardization call for the key exchange/encryption functionalities. In particular, we modify the algorithms for key generation, encapsulation and decapsulation to fit an alternative KEM framework, and we present a new set of parameters that use binary codes. We discuss advantages and disadvantages for each of the variants proposed.
2019
7th International Code-Based Cryptography Workshop, CBC 2019
978-3-030-25921-1
978-3-030-25922-8
Code-based cryptography; Key exchange; Post-quantum cryptography
02 Pubblicazione su volume::02a Capitolo o Articolo
DAGS: Reloaded Revisiting Dyadic Key Encapsulation / Banegas, G.; Barreto, P. S. L. M.; Boidje, B. O.; Cayrel, P. -L.; Dione, G. N.; Gaj, K.; Gueye, C. T.; Haeussler, R.; Klamti, J. B.; N'Diaye, O.; Nguyen, D. T.; Persichetti, E.; Ricardini, J. E.. - (2019), pp. 69-85. - LECTURE NOTES IN COMPUTER SCIENCE. [10.1007/978-3-030-25922-8_4].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1673065
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? 2
social impact