Score: 0

Simple Power Analysis of Polynomial Multiplication in HQC

Published: January 12, 2026 | arXiv ID: 2601.07634v1

By: Pavel Velek, Tomáš Rabas, Jiří Buček

Potential Business Impact:

Cracks secret codes that even quantum computers can't break.

Business Areas:
Quantum Computing Science and Engineering

The Hamming Quasi-Cyclic (HQC) cryptosystem was selected for standardization in the fourth round of the NIST Post-Quantum Cryptography (PQC) standardization project. The goal of the PQC project is to standardize one or more quantum-resistant public-key cryptographic algorithms. In this paper, we present a single-trace Simple Power Analysis (SPA) attack against HQC that exploits power consumption leakage that occurs during polynomial multiplication performed at the beginning of HQC decryption. Using the ChipWhisperer-Lite board, we perform and evaluate the attack, achieving a 99.69% success rate over 10 000 attack attempts. We also propose various countermeasures against the attack and evaluate their time complexity.

Country of Origin
🇨🇿 Czech Republic

Page Count
11 pages

Category
Computer Science:
Cryptography and Security