Vulnerability-Information Leakage of Reused Secret Key in NewHope

被引:0
|
作者
Terada, Routo [1 ]
Caceres Villena, Reynaldo [1 ]
机构
[1] Univ Sao Paulo, Dept Comp Sci, Sao Paulo, Brazil
关键词
post-quantum cryptography; key exchange; ring learning with errors; newhope-KEM;
D O I
10.1587/transfun.2021EAP1048
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The NIST post-quantum project intends to standardize cryptographic systems that are secure against attacks by both quantum and classical computers. One of these cryptographic systems is NewHope that is a RING-LWE based key exchange scheme. The NewHope Key Encapsulation Method (KEM) allows to establish an encapsulated (secret) key shared by two participants. This scheme defines a private key that is used to encipher a random shared secret and the private key enables the deciphering. This paper presents Fault Information Leakage attacks, using conventional personal computers, if the attacked participant, say Bob, reuses his public key. This assumption is not so strong since reusing the pair (secret, public) keys saves Bob's device computing cost when the public global parameter is not changed. With our result we can conclude that, to prevent leakage, Bob should not reuse his NewHope secret and public keys because Bob's secret key can be retrieved with only 2 communications. We also found that Bob's secret keys can be retrieved for NewHopeToy2, NewHopeToy1 and NewHopeLudicrous with 1, 2, and 3 communications, respectively.
引用
收藏
页码:952 / 964
页数:13
相关论文
共 50 条
  • [1] An Information Reconciliation Protocol for Secret-Key Agreement with Small Leakage
    Pacher, Christoph
    Grabenweger, Philipp
    Martinez-Mateo, Jesus
    Martin, Vicente
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 730 - 734
  • [2] Leakage of Signal function with reused keys in RLWE key exchange
    Ding, Jintai
    Alsayigh, Saed
    Saraswathy, R., V
    Fluhrer, Scott
    Lin, Xiaodong
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [3] Fault Analysis of Rabbit: Toward a Secret Key Leakage
    Berzati, Alexandre
    Canovas-Dumas, Cecile
    Goubin, Louis
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 72 - +
  • [4] Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage
    Ding, Jintai
    Fluhrer, Scott
    Rv, Saraswathy
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 467 - 486
  • [5] Unique Information and Secret Key Agreement
    James, Ryan G.
    Emenheiser, Jeffrey
    Crutchfield, James P.
    ENTROPY, 2019, 21 (01):
  • [6] Unique Information and Secret Key Decompositions
    Rauh, Johannes
    Banerjee, Pradeep Kr.
    Olbrich, Eckehard
    Jost, Juergen
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 3042 - 3046
  • [7] Common Information and Secret Key Capacity
    Tyagi, Himanshu
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (09) : 5627 - 5640
  • [8] Study on sensitive information leakage vulnerability modeling
    Kim, Sung-Hwan
    Kim, Nam-Uk
    Chung, Tai-Myoung
    KYBERNETES, 2015, 44 (01) : 77 - 88
  • [9] Modeling leakage process of key information
    Yang, Hao-Miao
    Gu, Xiao-Feng
    Li, Jian-Ping
    Sun, Shi-Xin
    WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING, VOL 1 AND 2, 2006, : 979 - +
  • [10] Near Optimal Secret Sharing for Information Leakage Maximization
    Lin, Frank Yeong-Sung
    Chu, Kuo-Chung
    Chen, Pei-Yu
    Chen, Guan-Wei
    TRENDS IN APPLIED INTELLIGENT SYSTEMS, PT III, PROCEEDINGS, 2010, 6098 : 189 - 198