Paper 2022/214
Breaking Rainbow Takes a Weekend on a Laptop
Abstract
This work introduces new key recovery attacks against the Rainbow signature scheme, which is one of the three finalist signature schemes still in the NIST Post-Quantum Cryptography standardization project. The new attacks outperform previously known attacks for all the parameter sets submitted to NIST and make a key-recovery practical for the SL 1 parameters. Concretely, given a Rainbow public key for the SL 1 parameters of the second-round submission, our attack returns the corresponding secret key after on average 53 hours (one weekend) of computation time on a standard laptop.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- multivariate cryptography cryptanalyis NIST PQC Rainbow
- Contact author(s)
- ward @ beullens com
- History
- 2022-06-21: last of 3 revisions
- 2022-02-25: received
- See all versions
- Short URL
- https://ia.cr/2022/214
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/214, author = {Ward Beullens}, title = {Breaking Rainbow Takes a Weekend on a Laptop}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/214}, year = {2022}, url = {https://eprint.iacr.org/2022/214} }