Vulnerability-Information Leakage of Reused Secret Key in NewHope

被引:0
|
作者
Terada, Routo [1 ]
Caceres Villena, Reynaldo [1 ]
机构
[1] Univ Sao Paulo, Dept Comp Sci, Sao Paulo, Brazil
关键词
post-quantum cryptography; key exchange; ring learning with errors; newhope-KEM;
D O I
10.1587/transfun.2021EAP1048
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The NIST post-quantum project intends to standardize cryptographic systems that are secure against attacks by both quantum and classical computers. One of these cryptographic systems is NewHope that is a RING-LWE based key exchange scheme. The NewHope Key Encapsulation Method (KEM) allows to establish an encapsulated (secret) key shared by two participants. This scheme defines a private key that is used to encipher a random shared secret and the private key enables the deciphering. This paper presents Fault Information Leakage attacks, using conventional personal computers, if the attacked participant, say Bob, reuses his public key. This assumption is not so strong since reusing the pair (secret, public) keys saves Bob's device computing cost when the public global parameter is not changed. With our result we can conclude that, to prevent leakage, Bob should not reuse his NewHope secret and public keys because Bob's secret key can be retrieved with only 2 communications. We also found that Bob's secret keys can be retrieved for NewHopeToy2, NewHopeToy1 and NewHopeLudicrous with 1, 2, and 3 communications, respectively.
引用
收藏
页码:952 / 964
页数:13
相关论文
共 50 条
  • [31] SILK-TV: Secret Information Leakage from Keystroke Timing Videos
    Balagani, Kiran S.
    Conti, Mauro
    Gasti, Paolo
    Georgiev, Martin
    Gurtler, Tristan
    Lain, Daniele
    Miller, Charissa
    Molas, Kendall
    Samarin, Nikita
    Saraci, Eugen
    Tsudik, Gene
    Wu, Lynn
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 263 - 280
  • [32] A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding
    Kim, Young-Sik
    Kim, Jong-Hwan
    Kim, Sang-Hyo
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (06) : 937 - 940
  • [33] Information-Theoretically Secret Key Generation for Fading Wireless Channels
    Ye, Chunxuan
    Mathur, Suhas
    Reznik, Alex
    Shah, Yogendra
    Trappe, Wade
    Mandayam, Narayan B.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 240 - 254
  • [34] A key transport protocol based on secret sharing applications to information security
    Eskicioglu, AM
    Delp, EJ
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (04) : 816 - 824
  • [35] On the Algorithmic Computability of the Secret Key and Authentication Capacity Under Channel, Storage, and Privacy Leakage Constraints
    Boche, Holger
    Schaefer, Rafael E.
    Baur, Sebastian
    Poor, H. Vincent
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (17) : 4636 - 4648
  • [36] Analysis of Information Reconciliation in Secret Key Agreement from the AWGN Channel
    Deguchi, Kana
    Isaka, Motohiko
    2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 2014,
  • [37] New Techniques for Localization Based Information Theoretic Secret Key Agreement
    Kazempour, Narges
    Mirmohseni, Mahtab
    Aref, Mohammad Reza
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 70 - 76
  • [38] Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage
    Oonishi, Kento
    Huang, Xiaoxuan
    Kunihiro, Noboru
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 278 - 296
  • [39] Channel state information based key generation vs. side-channel analysis key information leakage
    Li H.
    Zhang Q.
    Yuan H.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 264 - 268
  • [40] New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
    Maitra, Subhamoy
    Paul, Goutam
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 253 - +