Leakage of signal function with reused keys in RLWE key exchange

Jintai Ding University of Cincinnati, Ohio, USA Saed Alsayigh University of Cincinnati, Ohio, USA Saraswathy RV University of Cincinnati, Ohio, USA Scott Fluhrer Cisco Systems, USA Xiaodong Lin Rutgers University, USA

TBD mathscidoc:2207.43077

ICC 2017, 1-6, 2017.5
In this paper, we show that the signal function used in Ring-Learning with Errors (RLWE) key exchange could leak information to find the secret s of a reused public key p = as+2e. This work is motivated by an attack proposed in [1] and gives an insight into how public keys reused for long term in RLWE key exchange protocols can be exploited. This work specifically focuses on the attack on the KE protocol in [2] by initiating multiple sessions with the honest party and analyze the output of the signal function. Experiments have confirmed the success of our attack in recovering the secret.
No keywords uploaded!
[ Download ] [ 2022-07-15 10:30:45 uploaded by dingjt ] [ 323 downloads ] [ 0 comments ]
@inproceedings{jintai2017leakage,
  title={Leakage of signal function with reused keys in RLWE key exchange},
  author={Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott Fluhrer, and Xiaodong Lin},
  url={http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220715103045946487656},
  booktitle={ICC 2017},
  pages={1-6},
  year={2017},
}
Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott Fluhrer, and Xiaodong Lin. Leakage of signal function with reused keys in RLWE key exchange. 2017. In ICC 2017. pp.1-6. http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220715103045946487656.
Please log in for comment!
 
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved