Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack

Xinwei Gao Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, P.R.China Jintai Ding Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH 45219 Lin Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, P.R.China Jiqiang Liu Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, P.R.China

TBD mathscidoc:2207.43083

IEEE Transactions on Computers, 67, (11), 1584-1593, 2018.2
Ring Learning With Errors (RLWE)-based key exchange is one of the most efficient and secure primitive for post-quantum cryptography. One common approach to achieve key exchange over RLWE is error reconciliation. Recently, an efficient attack against reconciliation-based RLWE key exchange protocols with reused keys was proposed. This attack can recover a long-term private key if a key pair is reused. We also know that in the real world, key reuse is commonly adopted in applications like the Transport Layer Security (TLS) protocol to improve performance. Directly motivated by this attack, we construct a new randomized RLWE-based key exchange protocol against this attack. Our lightweight approach incorporates an additional ephemeral public error term into key exchange materials, so that this attack no longer works. With the same attack, we practically show that the signal value of our protocol is indistinguishable from uniform random, therefore, this attack no longer works. We explain how the attack fails, present 200-bit classic and 80-bit quantum secure parameter choice, efficient implementations, comparisons and discussion. Benchmark shows our protocol is truly efficient and even faster than related vulnerable protocols.
No keywords uploaded!
[ Download ] [ 2022-07-15 10:43:30 uploaded by dingjt ] [ 462 downloads ] [ 0 comments ]
@inproceedings{xinwei2018practical,
  title={Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack},
  author={Xinwei Gao, Jintai Ding, Lin Li, and Jiqiang Liu},
  url={http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220715104330053536662},
  booktitle={IEEE Transactions on Computers},
  volume={67},
  number={11},
  pages={1584-1593},
  year={2018},
}
Xinwei Gao, Jintai Ding, Lin Li, and Jiqiang Liu. Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. 2018. Vol. 67. In IEEE Transactions on Computers. pp.1584-1593. http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220715104330053536662.
Please log in for comment!
 
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved