A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding University of Cincinnati Chi Cheng China University of Geosciences Yue Qin China University of Geosciences

TBD mathscidoc:2207.43127

IACR Cryptol. ePrint Arch., 2019.3
In this paper, we present a simple attack on LWE and Ring LWE encryption schemes used directly as Key Encapsulation Mechanisms (KEMs). This attack could work due to the fact that a key mismatch in a KEM is accessible to an adversary. Our method clearly indicates that any LWE or RLWE (or any similar type of construction) encryption directly used as KEM can be broken by modifying our attack method according to the respective cases.
No keywords uploaded!
[ Download ] [ 2022-07-22 17:32:45 uploaded by dingjt ] [ 699 downloads ] [ 0 comments ]
@inproceedings{jintai2019a,
  title={A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)},
  author={Jintai Ding, Chi Cheng, and Yue Qin},
  url={http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220722173245071300711},
  booktitle={IACR Cryptol. ePrint Arch.},
  year={2019},
}
Jintai Ding, Chi Cheng, and Yue Qin. A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). 2019. In IACR Cryptol. ePrint Arch.. http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220722173245071300711.
Please log in for comment!
 
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved