Cryptology ePrint Archive: Report 2017/1252

Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids

Jacqueline Brendel and Marc Fischlin and Felix GŁnther

Abstract: Broken cryptographic algorithms and hardness assumptions are a constant threat to real-world protocols. Prominent examples are hash functions for which collisions become known, or number-theoretic assumptions which are threatened by advances in quantum computing. Especially when it comes to key exchange protocols, the switch to quantum-resistant primitives has begun and aims to protect today's secrets against future developments, moving from common Diffie-Hellman-based solutions to Learning-With-Errors-based approaches, often via intermediate hybrid designs.

To this date there exists no security notion for key exchange protocols that could capture the scenario of breakdowns of arbitrary cryptographic primitives to argue security of prior or even ongoing and future sessions. In this work we extend the common Bellare-Rogaway model to capture breakdown resilience of key exchange protocols. Our extended model allows us to study security of a protocol even in case of unexpected failure of employed primitives, may it be number-theoretic assumptions, hash functions, signature schemes, key derivation functions, etc. We then apply our security model to analyze two real-world protocols, showing that breakdown resilience for certain primitives is achieved by both an authenticated variant of the post-quantum secure key encapsulation mechanism NewHope (Alkim et al.) which is a second round candidate in the Post Quantum Cryptography standardization process by NIST, as well as by TLS 1.3, which has recently been standardized as RFC 8446 by the Internet Engineering Task Force. Finally, we analyze the security of a generic hybrid key exchange protocol, formally showing how such designs ensure resilience against breakdowns of one of their key exchange components.

Category / Keywords: cryptographic protocols / key exchange, breakdown resilience, hybrid key exchange, NewHope, TLS 1.3

Original Publication (with major differences): 24th European Symposium on Research in Computer Security (ESORICS 2019)
DOI:
10.1007/978-3-030-29962-0_25

Date: received 28 Dec 2017, last revised 16 Sep 2019

Contact author: jacqueline brendel at cryptoplexity de

Available format(s): PDF | BibTeX Citation

Note: ESORICS 2019 publication

Version: 20190916:172451 (All versions of this report)

Short URL: ia.cr/2017/1252


[ Cryptology ePrint archive ]