The security of most prominent code-based key encapsulation mechanisms (KEMs) relies on the hardness of the syndrome decoding problem. It is well-known that in the presence of syndromes, one gets a speed-up of roughly for decoding a single syndrome by a technique called Decoding One Out of Many (DOOM), due to Sendrier.
Modern code-based schemes like HQC and BIKE work over a polynomial ring that naturally leads to syndromes. As a consequence, DOOM-type speed-ups of have been taking into account for the HQC and BIKE parameter selection in the single-instance setting.
However, we analyse a naturally appearing multi-instance setting, where the same public key is used to derive session keys . Our attack goal is to reconstruct a single session key .
We show that in an HQC and BIKE multi-instance setting an attacker can construct a DOOM instance with syndromes. In a Classic McEliece multi-instance setting, an attacker obtains syndromes. Our results show that multi-instance security of code-based KEMs degrades as a function of . For KEMs designed for NIST security level 1 we drop below the desired bits for a number of session keys (), (), respectively ().
For HQC, we also analyse a Common Code setting, where all users share the same public quasi-cyclic code. We propose a DOOM-type attack that recovers a secret key given public keys. Our attack works within less than bit time complexity using users. As a consequence, HQC should not be used in a Common Code setting.