Paper 2020/1288
Improved attacks against key reuse in learning with errors key exchange
Nina Bindel, Douglas Stebila, and Shannon Veitch
Abstract
Basic key exchange protocols built from the learning with errors (LWE) assumption are insecure if secret keys are reused in the face of active attackers. One example of this is Fluhrer’s attack on the Ding, Xie, and Lin (DXL) LWE key exchange protocol, which exploits leakage from the signal function for error correction. Protocols aiming to achieve security against active attackers generally use one of two techniques: demonstrating well-formed keyshares using re-encryption like in the Fujisaki–Okamoto transform; or directly combining multiple LWE values, similar to MQV-style Diffie–Hellman-based protocols. In this work, we demonstrate improved and new attacks exploiting key reuse in several LWE-based key exchange protocols. First, we show how to greatly reduce the number of samples required to carry out Fluhrer’s attack and reconstruct the secret period of a noisy square waveform, speeding up the attack on DXL key exchange by a factor of over 200. We show how to adapt this to attack a protocol of Ding, Branco, and Schmitt (DBS) designed to be secure with key reuse, breaking the claimed 128-bit security level in under a minute. We also apply our technique to a second authenticated key exchange protocol of DBS that uses an additive MQV design, although in this case our attack makes use of ephemeral key compromise powers of the eCK security model, which was not in scope of the claimed BR-model security proof. Our results show that building secure authenticated key exchange protocols directly from LWE remains a challenging and mostly open problem.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- learning with errorskey exchangekey reuse
- Contact author(s)
-
nlbindel @ uwaterloo ca
dstebila @ uwaterloo ca
ssveitch @ uwaterloo ca - History
- 2021-05-27: last of 2 revisions
- 2020-10-16: received
- See all versions
- Short URL
- https://ia.cr/2020/1288
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/1288, author = {Nina Bindel and Douglas Stebila and Shannon Veitch}, title = {Improved attacks against key reuse in learning with errors key exchange}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/1288}, year = {2020}, url = {https://eprint.iacr.org/2020/1288} }