Cryptology ePrint Archive: Report 2020/1288

Improved attacks against key reuse in learning with errors key exchange

Nina Bindel and Douglas Stebila and Shannon Veitch

Abstract: Basic key exchange protocols built from the learning with errors (LWE) assumption are insecure if secret keys are reused in the face of active attackers. One example of this is Fluhrer's attack on the Ding, Xie, and Lin (DXL) LWE key exchange protocol, which exploits leakage from the signal function for error correction. Protocols aiming to achieve security against active attackers generally use one of two techniques: demonstrating well-formed keyshares using re-encryption like in the Fujisaki--Okamoto transform; or directly combining multiple LWE values, similar to MQV-style Diffie--Hellman-based protocols.

In this work, we demonstrate improved and new attacks exploiting key reuse in several LWE-based key exchange protocols. First, we show how to greatly reduce the number of samples required to carry out Fluhrer's attack and reconstruct the secret period of a noisy square waveform, speeding up the attack on DXL key exchange by a factor of over 200. We show how to adapt this to attack a protocol of Ding, Branco, and Schmitt (DBS) designed to be secure with key reuse, breaking the claimed 128-bit security level in under a minute. We also apply our technique to a second authenticated key exchange protocol of DBS that uses an additive MQV design, although in this case our attack makes use of ephemeral key compromise powers of the eCK security model, which was not in scope of the claimed BR-model security proof. Our results show that building secure authenticated key exchange protocols directly from LWE remains a challenging and mostly open problem.

Category / Keywords: public-key cryptography / learning with errors; key exchange; key reuse

Date: received 15 Oct 2020

Contact author: nlbindel at uwaterloo ca,dstebila@uwaterloo ca,ssveitch@uwaterloo ca

Available format(s): PDF | BibTeX Citation

Version: 20201016:064913 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]