Browse > Article
http://dx.doi.org/10.13089/JKIISC.2022.32.5.765

Ephemeral Key Reuse Attack of the SABER Algorithm by Meta-PKE Structure  

Lee, Changwon (Korea University)
Jeon, Chanho (Korea University)
Kim, Suhri (Sungshin Women's University)
Hong, Seokhie (Korea University)
Abstract
The SABER algorithm, a PKE/KEM algorithm presented in NIST PQC Standardization Round 3, is an algorithm based on the Module-LWR problem among lattice-based problems and has a Meta-PKE structure. At this time, the secret information used in the encryption process is called a ephemeral key, and in this paper, the ephemeral key reuse attack using the Meta-PKE structure is described. For each parameter satisfying the security strengths required by NIST, we present a detailed analysis of the previous studies attacked using 4, 6, and 6 queries, and improve them, using only 3, 4, and 4 queries. In addition, we introduce how to reduce the computational complexity of recovering ephemeral keys with a single query from the brute-force complexity on the n-dimension lattice, 27.91×n, 210.51×n, 212.22×n to 24.91×n, 26.5×n, 26.22×n, for each parameter, and present the results and limitations.
Keywords
PQC; KEM; Lattice; SABER; Reuse Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Wang, Z. Zhang, and H. Jiang,"Security of two NIST candidatesinthe presence of randomness reuse," Provable and Practical Security,ProvSec 2020, pp. 402-421, Nov. 2020.
2 E. Alkim, L. Ducas, T. Poppelmann,P. Schwabe, "Post-quantumkeyexchange - a new hope," 25th Usenix Security Symposium, USENIX Association, pp. 327-343, Aug. 2016.
3 J.P. D'Anvers, A. Karmakar, S.S. Roy,and F. Vercauteren, "Saber:Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM," Progress inCryptology -AFRICACRYPT2018, AFRICACRYPT 2018, pp. 282-305,Apr. 2018.
4 J. Bos et al., "CRYSTALS - Kyber:ACCA-Secure Module-Lattice-BasedKEM," 2018 IEEE EuropeanSymposium on Security and Privacy(EuroS&P), pp. 353-367, Apr. 2018.
5 C. Liu, Z. Zheng, G. Zou, "Key Reuse Attack on New Hope Key Exchange Protocol," Information Security and Cryptology - ICISC 2018, ICISC2018,pp. 163-176, Jan. 2019.
6 X. Lu et al., "LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus," IACR ePrint 2018-1009, Oct. 2018.
7 S. Okada, Y. Wang, "Recovery Attackon Bob's Reused Randomnessin CRYSTALS-KYBER and SABER," Provable and Practical Security,ProvSec 2021, pp. 155-173, Nov. 2021.
8 E. Rescorla, "The Transport LayerSecurity (TLS) protocol version1.3," RFC 8446, Aug. 2018.
9 P.W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantumcomputer," SIAM Journal Computing,vol. 26, no. 5, pp. 1484-1509, Oct.1997.   DOI