Reaction Attacks Against Several Public-Key Cryptosystems

C. Hall, I. Goldberg, and B. Schneier

Proceedings of Information and Communication Security, ICICS'99, Springer-Verlag, 1999, pp. 2-12.

ABSTRACT: We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their security on the apparent intractability of one or more problems. The attacks we present do not violate the intractability of the underlying problems, but instead obtain information about the private key or plaintext by watching the reaction of someone decrypting a given ciphertext with the private key. In the case of the McEliece system, we must repeat the attack for each ciphertext we wish to decrypt, whereas for the Ajtai-Dwork system, we are able to recover the private key.

[full text - PDF (Acrobat)] [full text - Postscript]

Categories: Protocol Analyses

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc.