Paper 2023/887

Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond

Mingyao Shao, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Yuejun Liu, School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China
Yongbin Zhou, School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Abstract

Key mismatch attacks resilience is a great concern for KEMs in the NIST PQC standardization process. In key mismatch attacks, the adversary aims to recover the reused key by sending special form of ciphertexts to the target party and observing whether the shared key matches his guesses or not. In this paper, we propose pairwise-parallel key mismatch attacks on Kyber and other lattice-based KEMs. The strategy is to recover partial information about multiple secret key coefficient-pairs in a parallel way per query. We realize the required multi-value key mismatch oracle in a simple key exchange scenario and experimentally validate our proposed attacks. Our attacks greatly reduce the number of queries required to recover the full secret key. Specifically, compared with state-of-the-art key mismatch attacks on CPA-secure Kyber, our attacks reduce the number of queries by 95% with computational complexity $2^{32}$. Then we employ the post-processing with lattice reduction to further minimize the number of queries. The results show we only need 78 queries to recover the full secret key with a lattice reduction cost of $2^{32}$. Moreover, our proposed pairwise-parallel attack method can be directly applied to enhance the PC oracle-based SCA against CCA-secure Kyber, reducing the number of queries/traces by 16.67%.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Lattice-based cryptographyKey encapsulation mechanismKey exchangeKey reuseKey mismatch attacksKyber
Contact author(s)
shaomingyao @ iie ac cn
liuyuejun @ njust edu cn
History
2023-06-12: approved
2023-06-09: received
See all versions
Short URL
https://ia.cr/2023/887
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/887,
      author = {Mingyao Shao and Yuejun Liu and Yongbin Zhou},
      title = {Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond},
      howpublished = {Cryptology ePrint Archive, Paper 2023/887},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/887}},
      url = {https://eprint.iacr.org/2023/887}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.