Paper 2020/1288

Improved attacks against key reuse in learning with errors key exchange

Nina Bindel, Douglas Stebila, and Shannon Veitch

Abstract

Basic key exchange protocols built from the learning with errors (LWE) assumption are insecure if secret keys are reused in the face of active attackers. One example of this is Fluhrer’s attack on the Ding, Xie, and Lin (DXL) LWE key exchange protocol, which exploits leakage from the signal function for error correction. Protocols aiming to achieve security against active attackers generally use one of two techniques: demonstrating well-formed keyshares using re-encryption like in the Fujisaki–Okamoto transform; or directly combining multiple LWE values, similar to MQV-style Diffie–Hellman-based protocols. In this work, we demonstrate improved and new attacks exploiting key reuse in several LWE-based key exchange protocols. First, we show how to greatly reduce the number of samples required to carry out Fluhrer’s attack and reconstruct the secret period of a noisy square waveform, speeding up the attack on DXL key exchange by a factor of over 200. We show how to adapt this to attack a protocol of Ding, Branco, and Schmitt (DBS) designed to be secure with key reuse, breaking the claimed 128-bit security level in under a minute. We also apply our technique to a second authenticated key exchange protocol of DBS that uses an additive MQV design, although in this case our attack makes use of ephemeral key compromise powers of the eCK security model, which was not in scope of the claimed BR-model security proof. Our results show that building secure authenticated key exchange protocols directly from LWE remains a challenging and mostly open problem.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
learning with errorskey exchangekey reuse
Contact author(s)
nlbindel @ uwaterloo ca
dstebila @ uwaterloo ca
ssveitch @ uwaterloo ca
History
2021-05-27: last of 2 revisions
2020-10-16: received
See all versions
Short URL
https://ia.cr/2020/1288
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1288,
      author = {Nina Bindel and Douglas Stebila and Shannon Veitch},
      title = {Improved attacks against key reuse in learning with errors key exchange},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/1288},
      year = {2020},
      url = {https://eprint.iacr.org/2020/1288}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.