Cryptology ePrint Archive: Report 2019/525

Misuse Attacks on Post-Quantum Cryptosystems

Ciprian Băetu and F. Betül Durak and Loďs Huguenin-Dumittan and Abdullah Talayhan and Serge Vaudenay

Abstract: Many post-quantum cryptosystems which have been proposed in the National Institute of Standards and Technology (NIST) standardization process follow the same meta-algorithm, but in different algebras or different encoding methods. They usually propose two constructions, one being weaker and the other requiring a random oracle. We focus on the weak version of nine submissions to NIST. Submitters claim no security when the secret key is used several times. In this paper, we analyze how easy it is to run a key recovery under multiple key reuse. We mount a classical key recovery under plaintext checking attacks (i.e., with a plaintext checking oracle saying if a given ciphertext decrypts well to a given plaintext) and a quantum key recovery under chosen ciphertext attacks. In the latter case, we assume quantum access to the decryption oracle.

Category / Keywords: public-key cryptography / post-quantum cryptography, cryptanalysis

Original Publication (in the same form): IACR-EUROCRYPT-2019

Date: received 19 May 2019

Contact author: serge vaudenay at epfl ch, durakfbetul@gmail com, lois huguenin-dumittan@epfl ch

Available format(s): PDF | BibTeX Citation

Version: 20190520:203431 (All versions of this report)

Short URL: ia.cr/2019/525


[ Cryptology ePrint archive ]