Paper 2016/1176

Leakage of Signal function with reused keys in RLWE key exchange

Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott Fluhrer, and Xiaodong Lin

Abstract

In this paper, we show that the signal function used in Ring-Learning with Errors (RLWE) key exchange could leak information to find the secret $s$ of a reused public key $p=as+2e$. This work is motivated by an attack proposed in \cite{cryptoeprint:2016:085} and gives an insight into how public keys reused for long term in RLWE key exchange protocols can be exploited. This work specifically focuses on the attack on the KE protocol in \cite{Ding} by initiating multiple sessions with the honest party and analyze the output of the signal function. Experiments have confirmed the success of our attack in recovering the secret.

Note: minor corrections

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. 2017 IEEE ICC Conference Proceedings
Keywords
RLWEkey exchangepost quantumkey reuseactive attacks
Contact author(s)
jintai ding @ gmail com
rvsaras86 @ gmail com
History
2017-12-05: last of 3 revisions
2016-12-30: received
See all versions
Short URL
https://ia.cr/2016/1176
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/1176,
      author = {Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott Fluhrer and Xiaodong Lin},
      title = {Leakage of Signal function with reused keys in RLWE key exchange},
      howpublished = {Cryptology ePrint Archive, Paper 2016/1176},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/1176}},
      url = {https://eprint.iacr.org/2016/1176}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.