Cryptology ePrint Archive: Report 2016/1176

Leakage of Signal function with reused keys in RLWE key exchange

Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott Fluhrer and Xiaodong Lin

Abstract: In this paper, we show that the signal function used in Ring-Learning with Errors (RLWE) key exchange could leak information to find the secret $s$ of a reused public key $p=as+2e$. When RLWE public keys reused for long term, it can be exploited by initiating multiple sessions with the honest party and analyzing the output of the signal function. Experiments have confirmed the success of our attack in recovering the secret.

Category / Keywords: publickey cryptography / RLWE, key exchange, post quantum, key reuse, active attacks

Original Publication (in the same form): 2017 IEEE ICC Conference Proceedings

Date: received 22 Dec 2016, last revised 1 Mar 2017

Contact author: jintai ding at gmail com

Available format(s): PDF | BibTeX Citation

Note: Change to the abstract and some minor changes.

Version: 20170301:223640 (All versions of this report)

Short URL: ia.cr/2016/1176

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]