You are looking at a specific version 20190312:115846 of this paper. See the latest version.

Paper 2019/271

A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding and Chi Cheng and Yue Qin

Abstract

In this paper, we present a simple attack on LWE and Ring LWE encryption schemes used directly as Key Encapsulation Mechanisms (KEMs). This attack could work due to the fact that a key mismatch in a KEM is accessible to an adversary. Our method clearly indicates that any LWE or RLWE (or any similar type of construction) encryption directly used as KEM can be broken by modifying our attack method according to the respective cases.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
LWERLWEKEMkey mismatch
Contact author(s)
jintai ding @ gmail com,chengchizz @ gmail com
History
2019-03-12: received
Short URL
https://ia.cr/2019/271
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.