cronokirby

(2026-03) Multi-Instance Security Degradation of Code-Based KEMs

2026-03-13

Abstract

The security of most prominent code-based key encapsulation mechanisms (KEMs) relies on the hardness of the syndrome decoding problem. It is well-known that in the presence of nn syndromes, one gets a speed-up of roughly n\sqrt n for decoding a single syndrome by a technique called Decoding One Out of Many (DOOM), due to Sendrier.

Modern code-based schemes like HQC and BIKE work over a polynomial ring F2[X]/(Xn1)\mathbb{F}_2[X]/(X^n-1) that naturally leads to nn syndromes. As a consequence, DOOM-type speed-ups of n\sqrt n have been taking into account for the HQC and BIKE parameter selection in the single-instance setting.

However, we analyse a naturally appearing multi-instance setting, where the same public key is used to derive MM session keys K(1),,K(M)K^{(1)}, \ldots, K^{(M)}. Our attack goal is to reconstruct a single session key K(i)K^{(i)}.

We show that in an HQC and BIKE multi-instance setting an attacker can construct a DOOM instance with nMnM syndromes. In a Classic McEliece multi-instance setting, an attacker obtains MM syndromes. Our results show that multi-instance security of code-based KEMs degrades as a function of MM. For KEMs designed for NIST security level 1 we drop below the desired 143143 bits for a number of session keys M269M \geq 2^{69} (HQC-1\texttt{HQC-1}), M28M \geq 2^{8} (BIKE-1\texttt{BIKE-1}), respectively M215M \geq 2^{15} (mcecliece3488-64\texttt{mcecliece3488-64}).

For HQC, we also analyse a Common Code setting, where all users share the same public quasi-cyclic code. We propose a DOOM-type attack that recovers a secret key given MM public keys. Our attack works within less than 143143 bit time complexity using M29M \geq 2^{9} users. As a consequence, HQC should not be used in a Common Code setting.