mirror of
https://github.com/open-quantum-safe/liboqs.git
synced 2025-10-15 00:01:37 -04:00
* Remove HQC round 2 * Sync with PQClean 3c8be3cb1f8ca0953f2df44ea665f118efb468d6 * Add HQC from PQClean
37 lines
2.7 KiB
Markdown
37 lines
2.7 KiB
Markdown
Rainbow
|
|
=======
|
|
|
|
- **Algorithm type**: signature
|
|
- **Main cryptographic assumption**: multivariable polynomials, unbalanced oil and vinegatr
|
|
- **Scheme authors**: Jintai Ding, Ming-Shing Chen, Albrecht Petzoldt, Dieter Schmidt, Bo-Yin Yang
|
|
- **Version**: NIST Round 2 submission
|
|
|
|
Implementation
|
|
--------------
|
|
|
|
- **Source of implementation**: https://github.com/fast-crypto-lab/rainbow-submission-round2
|
|
- **Implementation version**: https://github.com/PQClean/PQClean/commit/3c8be3cb1f8ca0953f2df44ea665f118efb468d6
|
|
- **License**: CC0 1.0
|
|
- **Constant-time**: Yes
|
|
- **Optimizations**: Portable C
|
|
|
|
Parameter sets
|
|
--------------
|
|
|
|
| Parameter set | Security model | Claimed NIST security level | Public key size (bytes) | Secret key size (bytes) | Signature size (bytes) |
|
|
|--------------------------------|:--------------:|:---------------------------:|:-----------------------:|:-----------------------:|:----------------------:|
|
|
| Rainbow-Ia-Classic | EUF-CMA | 1 | 148992 | 92960 | 64 |
|
|
| Rainbow-Ia-Cyclic | EUF-CMA | 1 | 58144 | 92960 | 64 |
|
|
| Rainbow-Ia-Cyclic-Compressed | EUF-CMA | 1 | 58144 | 64 | 64 |
|
|
| Rainbow-IIIc-Classic | EUF-CMA | 3 | 710640 | 511448 | 156 |
|
|
| Rainbow-IIIc-Cyclic | EUF-CMA | 3 | 206744 | 511448 | 156 |
|
|
| Rainbow-IIIc-Cyclic-Compressed | EUF-CMA | 3 | 206744 | 64 | 156 |
|
|
| Rainbow-Vc-Classic | EUF-CMA | 5 | 1705536 | 1227104 | 204 |
|
|
| Rainbow-Vc-Cyclic | EUF-CMA | 5 | 491936 | 1227104 | 204 |
|
|
| Rainbow-Vc-Cyclic-Compressed | EUF-CMA | 5 | 491936 | 64 | 204 |
|
|
|
|
Security considerations
|
|
-----------------------
|
|
|
|
In October 2020, Beullens announced [improved cryptanalysis of Rainbow](https://eprint.iacr.org/2020/1343.pdf) that somewhat reduces the security of the Round 2 and Round 3 parameters. [As of October 28, 2020](https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/70We3SNi7Ss), the scheme authors have acknowledged the attack and are preparing a response.
|