Vulnerability-Information Leakage of Reused Secret Key in NewHope

被引:0
|
作者
Terada, Routo [1 ]
Caceres Villena, Reynaldo [1 ]
机构
[1] Univ Sao Paulo, Dept Comp Sci, Sao Paulo, Brazil
关键词
post-quantum cryptography; key exchange; ring learning with errors; newhope-KEM;
D O I
10.1587/transfun.2021EAP1048
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The NIST post-quantum project intends to standardize cryptographic systems that are secure against attacks by both quantum and classical computers. One of these cryptographic systems is NewHope that is a RING-LWE based key exchange scheme. The NewHope Key Encapsulation Method (KEM) allows to establish an encapsulated (secret) key shared by two participants. This scheme defines a private key that is used to encipher a random shared secret and the private key enables the deciphering. This paper presents Fault Information Leakage attacks, using conventional personal computers, if the attacked participant, say Bob, reuses his public key. This assumption is not so strong since reusing the pair (secret, public) keys saves Bob's device computing cost when the public global parameter is not changed. With our result we can conclude that, to prevent leakage, Bob should not reuse his NewHope secret and public keys because Bob's secret key can be retrieved with only 2 communications. We also found that Bob's secret keys can be retrieved for NewHopeToy2, NewHopeToy1 and NewHopeLudicrous with 1, 2, and 3 communications, respectively.
引用
收藏
页码:952 / 964
页数:13
相关论文
共 50 条
  • [41] Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio
    Jost, Daniel
    Maurer, Ueli
    Ribeiro, Joao L.
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 345 - 369
  • [42] Excess leakage of information in quantum key distribution with passive side channels
    Babukhin, D. V.
    Sych, D. V.
    ST PETERSBURG POLYTECHNIC UNIVERSITY JOURNAL-PHYSICS AND MATHEMATICS, 2023, 16 (03): : 439 - 442
  • [43] Minimization of information leakage in continuous-variable quantum key distribution
    Winnel, Matthew S.
    Hosseinidehaj, Nedasadat
    Ralph, Timothy C.
    PHYSICAL REVIEW A, 2021, 104 (01)
  • [44] A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage
    Labao, Alfonso
    Adorna, Henry
    CRYPTOGRAPHY, 2022, 6 (01)
  • [45] Secret Key Agreement by Reliability Information of Signals in Gaussian Maurer's Model
    Naito, Masashi
    Watanabe, Shun
    Matsumoto, Ryutaroh
    Uyematsu, Tomohiko
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 727 - +
  • [46] Compressed Secret Key Agreement: Maximizing Multivariate Mutual Information per Bit
    Chan, Chung
    ENTROPY, 2017, 19 (10)
  • [47] Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna
    Shimizu, Takayuki
    Iwai, Hisato
    Sasaoka, Hideichi
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 148 - 159
  • [48] Time-Entanglement QKD: Secret Key Rates and Information Reconciliation Coding
    Boutros, Joseph J.
    Soljanin, Emina
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (12) : 7174 - 7188
  • [49] Towards An Effective Secret Key Generation Scheme for Imperfect Channel State Information
    Cheng, Longwang
    Li, Wei
    Ma, Dongtang
    Zhou, Li
    Zhu, Chunsheng
    Wei, Jibo
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 915 - 920
  • [50] Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation
    Zhang, Shengjun
    Jin, Liang
    Zhu, Shilei
    Huang, Kaizhi
    Zhong, Zhou
    2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,