Survey on Side-Channel Attacks on Code-Based Key Encapsulation Mechanism
Pierre-Louis Cayrel\,^1, Mohamed Fall\,^2, Laila Mesmoudi\,^2 and Cheikh Tiecoumba Gueye\,^2
\,^{1}Université Jean Monnet Saint-Etienne, CNRS, Institut d Optique Graduate School,
Laboratoire Hubert Curien UMR 5516, F-42023, SAINT-ETIENNE, France
\,^{2}Université Cheikh Anta Diop, Laboratoire d’Algèbre de Cryptologie de Géométrie algébrique et Application,
Dakar, Sénégal
Pages 109-137 | Received 21 October 2024, Accepted 31 December 2024, Published 10 July 2025
Abstract
Code-based Key Encapsulation Mechanisms (KEM) represent a promising solution in the field of post-quantum cryptography, providing security guarantees rooted in well-studied mathematical problems, such as decoding linear codes with or without errors. This survey offers an in-depth analysis of the main code-based KEM constructions, including Classic McEliece, BIKE, and HQC. We describe their theoretical foundations, key algorithms (key generation, encapsulation, and decapsulation), as well as their strengths and weaknesses in terms of security and efficiency. Particular attention is given to the practical vulnerabilities of these schemes against cryptanalytic attacks, such as side-channel attacks, fault injection attacks, and specific techniques for key and message recovery. We also highlight the countermeasures proposed in the literature to strengthen their security, including constant-time algorithms, hardware protections, and improvements to decoding mechanisms. Furthermore, we discuss the challenges related to the implementation and adoption of these systems in constrained environments, such as the Internet of Things (IoT), while evaluating their potential in contexts where quantum security becomes a critical necessity. This work aims to provide a clear and comprehensive overview of recent advances and future directions for the development of robust and efficient code-based KEMs, contributing to the transition toward post-quantum cryptographic standards.
Keywords: Post-quantum cryptography, Code-based cryptography, Keyen capsulation mechanisms(KEMs), Classic McEliece, BIKE, HQC, Cryptanalysis, Counter measures.
MSC numbers: Primary 94A60; Secondary 14G50.
Downloads: Full-text PDF
