Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information

Authors

  • Marcus Brinkmann Ruhr University Bochum, Bochum, Germany https://orcid.org/0000-0001-5649-6357
  • Chitchanok Chuengsatiansup The University of Klagenfurt, Klagenfurt, Austria
  • Alexander May Ruhr University Bochum, Bochum, Germany
  • Julian Nowakowski Ruhr University Bochum, Bochum, Germany
  • Yuval Yarom Ruhr University Bochum, Bochum, Germany

DOI:

https://doi.org/10.46586/tches.v2025.i2.94-125

Keywords:

McEliece, Gaussian elimination, Side-channel leakage, Key recovery with hints

Abstract

The McEliece cryptosystem is a strong contender for post-quantum schemes, including key encapsulation for confidentiality of key exchanges in network protocols. A McEliece secret key is a structured parity check matrix that is transformed via Gaussian elimination into an unstructured public key. We show that this transformation is highly critical with respect to side-channel leakage. We assume leakage of the elementary row operations during Gaussian elimination, motivated by McEliece implementations in the cryptographic libraries Classic McEliece and Botan.
We propose a novel decoding algorithm to reconstruct a secret key from its public key with information from a Gaussian transformation leak. Even if the obtained side-channel leakage is extremely noisy, i.e., each bit is flipped with probability as high as r ≈ 0.4, we succeed to recover the secret key in a matter of minutes for all proposed (Classic) McEliece instantiations. Remarkably, for high-security McEliece parameters, our attack is more powerful in the sense that it can tolerate even larger r . We demonstrate our attack on the constant-time reference implementation of Classic McEliece in a single-trace setting, using an STM32L592 ARM processor.
Our result stresses the necessity of properly protecting highly structured code-based schemes such as McEliece against side-channel leakage.

Downloads

Published

2025-03-04

Issue

Section

Articles

How to Cite

Brinkmann, M., Chuengsatiansup, C., May, A., Nowakowski, J., & Yarom, Y. (2025). Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(2), 94-125. https://doi.org/10.46586/tches.v2025.i2.94-125