We find this assumption to be difficult to main-
tain, since predicting the beginning of the error floor
region is an extremely challenging task, which has
currently no satisfactory closed form solution. In-
deed, phenomena such as the existence of the so-
called trapping sets (particular sets of error patterns
which cause an iterative decoder to fail), which are
deemed to have a negligible impact in the assump-
tion made in (Sendrier and Vasseur, 2019a), are one
of the prime objects of study to determine the location
of the error floor region (Richardson, 2003; Hashemi
and Banihashemi, 2019).
We note that if either a concavity change, or sim-
ply the change in the rate of the exponential decrease
of the DFR curve before the concavity change, takes
place before the region of practical interest, the ex-
trapolations made in (Sendrier and Vasseur, 2019a)
will provide cryptosystem parameters which are not
matching the DFR needed in IND-CCA2 construc-
tions. We therefore believe that relying on DFR curve
extrapolations may provide overly optimistic cryp-
tosystem parameter designs (Drucker and Gueron,
2017; Drucker et al., 2019).
In (Sendrier and Vasseur, 2019a), the authors also
analyze an in-place decoding algorithm, called Step-
by-step decoder modeling its DFR. The proposed
analysis however, obtains a DFR estimate which is
lower than the actual DFR obtained via numerical
simulation, and thus cannot be employed when an up-
per bound of the DFR value is desired. Furthermore,
the proposed analysis considers the asymptotic be-
haviour of the Step-by-step decoder when an infinite
number of iterations is performed. Such an approach
provides a practical hindrance in principle to the im-
plementation of the decoding procedure as a constant
time one, as there is no fixed upper bound to the num-
ber of iterations a-priori.
In this work, we obtain a characterization of a
simple in-place decoder with a finite number of iter-
ations, allowing its constant-time implementation in
practice. Our characterization provides a statistical
model which, by considering the worst case evalua-
tion of the decoder, provides a conservative estimate
of the decoder evolution. As a result, we do not rely
on any specific a-priori assumption on the behaviour
of the DFR curve but, on the contrary, completely de-
rive it as a function of the scheme parameters and the
decoder setting.
6 CONCLUSION
We have presented a statistical analysis of the be-
haviour of an in-place randomized bit-flipping (IR-
BF) decoder, derived from the classic in-place bit-
flipping decoder by randomizing the order in which
the estimated error positions are processed. The said
modification allows us to derive a worst-case analy-
sis for the DFR of syndrome-decoding based systems,
which is employed to design code parameters for QC-
LDPC/QC-MDPC based cryptoystems matching the
DFR figures of merit needed to provide IND-CCA2
guarantees. Differently from other solutions available
at the state-of-the-art, the proposed analysis allows
to fix the number of iterations of the IR-BF decoder
a-priori (e.g., imax = 2), allowing an easy constant-
time implementation, preventing timing-based side
channel attacks.
REFERENCES
Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang,
Q., Miller, C., Moody, D., Peralta, R., Perlner, R.,
Robinson, A., Smith-Tone, D., and Liu, Y.-K. (2019).
Status report on the first round of the NIST post-
quantum cryptography standardization process. Tech-
nical Report NISTIR 8240.
Baldi, M., Barenghi, A., Chiaraluce, F., Pelosi, G., and San-
tini, P. (2018). LEDAkem: A post-quantum key en-
capsulation mechanism based on QC-LDPC codes. In
Lange, T. and Steinwandt, R., editors, Post-Quantum
Cryptography - 9th Int.’l Conference, PQCrypto 2018,
Fort Lauderdale, April 9-11, 2018, volume 10786 of
LNCS, pages 3–24. Springer.
Baldi, M., Barenghi, A., Chiaraluce, F., Pelosi, G., and San-
tini, P. (2019a). A finite regime analysis of informa-
tion set decoding algorithms. Algorithms, 12:209.
Baldi, M., Barenghi, A., Chiaraluce, F., Pelosi, G., and
Santini, P. (2019b). LEDAcrypt 2.5 specification.
https://www.ledacrypt.org/documents/LEDAcrypt_
spec_2_5.pdf.
Baldi, M., Barenghi, A., Chiaraluce, F., Pelosi, G., and San-
tini, P. (2019c). LEDAcrypt: QC-LDPC code-based
cryptosystems with bounded decryption failure rate.
In Baldi, M., Persichetti, E., and Santini, P., editors,
Code-Based Cryptography. CBC 2019, volume 11666
of LNCS, pages 11–43. Springer, Cham.
Baldi, M., Barenghi, A., Chiaraluce, F., Pelosi, G., and San-
tini, P. (2019d). LEDAcrypt website. https://www.
ledacrypt.org/.
Baldi, M., Chiaraluce, F., Garello, R., and Mininni, F.
(2007). Quasi-cyclic low-density parity-check codes
in the McEliece cryptosystem. In ICC 2007.
Barenghi, A., Fornaciari, W., Galimberti, A., Pelosi, G.,
and Zoni, D. (2019). Evaluating the Trade-offs in the
Hardware Design of the LEDAcrypt Encryption Func-
tions. In 26th IEEE International Conference on Elec-
tronics, Circuits and Systems, ICECS 2019, Genoa,
Italy, November 27-29, 2019, pages 739–742. IEEE.
Berlekamp, E. R., McEliece, R. J., and van Tilborg, H.
C. A. (1978). On the inherent intractability of certain
coding problems. IEEE Trans. Information Theory,
24(3):384–386.
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
247