Vulnerability-Information Leakage of Reused Secret Key in NewHope

被引:0
|
作者
Terada, Routo [1 ]
Caceres Villena, Reynaldo [1 ]
机构
[1] Univ Sao Paulo, Dept Comp Sci, Sao Paulo, Brazil
关键词
post-quantum cryptography; key exchange; ring learning with errors; newhope-KEM;
D O I
10.1587/transfun.2021EAP1048
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The NIST post-quantum project intends to standardize cryptographic systems that are secure against attacks by both quantum and classical computers. One of these cryptographic systems is NewHope that is a RING-LWE based key exchange scheme. The NewHope Key Encapsulation Method (KEM) allows to establish an encapsulated (secret) key shared by two participants. This scheme defines a private key that is used to encipher a random shared secret and the private key enables the deciphering. This paper presents Fault Information Leakage attacks, using conventional personal computers, if the attacked participant, say Bob, reuses his public key. This assumption is not so strong since reusing the pair (secret, public) keys saves Bob's device computing cost when the public global parameter is not changed. With our result we can conclude that, to prevent leakage, Bob should not reuse his NewHope secret and public keys because Bob's secret key can be retrieved with only 2 communications. We also found that Bob's secret keys can be retrieved for NewHopeToy2, NewHopeToy1 and NewHopeLudicrous with 1, 2, and 3 communications, respectively.
引用
收藏
页码:952 / 964
页数:13
相关论文
共 50 条
  • [21] The secret recipe: key ingredients of agreements to protect confidential information
    Parker, Nigel
    JOURNAL OF INTELLECTUAL PROPERTY LAW & PRACTICE, 2011, 6 (04) : 223 - 229
  • [23] Communication Complexity of the Secret Key Agreement in Algorithmic Information Theory
    Gurpinar, Emirhan
    Romashchenko, Andrei
    ACM TRANSACTIONS ON COMPUTATION THEORY, 2024, 16 (03)
  • [24] Multivariate Mutual Information Inspired by Secret-Key Agreement
    Chan, Chung
    Al-Bashabsheh, Ali
    Ebrahimi, Javad B.
    Kaced, Tarik
    Liu, Tie
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1883 - 1913
  • [25] Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information
    Chitambar, Eric
    Fortescue, Benjamin
    Hsieh, Min-Hsiu
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 443 - 462
  • [26] Secret Key Agreement from Correlated Data, with No Prior Information
    Zimand, Marius
    37TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE (STACS 2020), 2020, 154
  • [27] Low-Complexity Dynamic Directional Modulation: Vulnerability and Information Leakage
    Silva, Pedro E. Goria
    Narbudowicz, Adam
    Marchetti, Nicola
    Nardelli, Pedro H. J.
    de Souza, Rausley Adriano Amaral
    Moualeu, Jules M.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 6290 - 6300
  • [28] Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage
    Demme, John
    Martin, Robert
    Waksman, Adam
    Sethumadhavan, Simha
    2012 39TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2012, : 106 - 117
  • [29] Analysis of a rate-adaptive reconciliation protocol and the effect of leakage on the secret key rate
    Elkouss, David
    Martinez-Mateo, Jesus
    Martin, Vicente
    PHYSICAL REVIEW A, 2013, 87 (04)
  • [30] A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience
    Zhang, Yinghui
    Lang, Pengzhen
    Zheng, Dong
    Yang, Menglei
    Guo, Rui
    SECURITY AND COMMUNICATION NETWORKS, 2018,