OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates

Authors

  • Haiyue Dong Independent Researcher, Lund, Sweden
  • Qian Guo Lund University, Lund, Sweden

DOI:

https://doi.org/10.46586/tches.v2025.i1.251-274

Keywords:

Code-based cryptography, NIST post-quantum cryptography standardization, HQC, Side-channel attacks, KEM

Abstract

In this paper, we introduce OT-PCA, a novel approach for conducting Plaintext-Checking (PC) oracle based side-channel attacks, specifically designed for Hamming Quasi-Cyclic (HQC). By calling the publicly accessible HQC decoder, we build offline templates that enable efficient extraction of soft information for hundreds of secret positions with just a single PC oracle call. Our method addresses critical challenges in optimizing key-related information extraction, including maximizing decryption output entropy and ensuring error pattern independence, through the use of genetic-style algorithms.
Extensive simulations demonstrate that our new attack method significantly reduces the required number of oracle calls, achieving a 2.4-fold decrease for hqc-128 and even greater reductions for hqc-192 and hqc-256 compared to current state-of-the-art methods. Notably, the attack shows strong resilience against inaccuracy in the PC oracle—when the oracle accuracy decreases to 95%, the reduction factor in oracle call requirements increases to 7.6 for hqc-128.
Lastly, a real-world evaluation conducted using power analysis on a platform with an ARM Cortex-M4 microcontroller validates the practical applicability and effectiveness of our approach.

Downloads

Published

2024-12-09

Issue

Section

Articles

How to Cite

OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates. (2024). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 251-274. https://doi.org/10.46586/tches.v2025.i1.251-274