Ephemeral Key Reuse Attack of the SABER Algorithm by Meta-PKE Structure |
Lee, Changwon
(Korea University)
Jeon, Chanho (Korea University) Kim, Suhri (Sungshin Women's University) Hong, Seokhie (Korea University) |
1 | K. Wang, Z. Zhang, and H. Jiang,"Security of two NIST candidatesinthe presence of randomness reuse," Provable and Practical Security,ProvSec 2020, pp. 402-421, Nov. 2020. |
2 | E. Alkim, L. Ducas, T. Poppelmann,P. Schwabe, "Post-quantumkeyexchange - a new hope," 25th Usenix Security Symposium, USENIX Association, pp. 327-343, Aug. 2016. |
3 | J.P. D'Anvers, A. Karmakar, S.S. Roy,and F. Vercauteren, "Saber:Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM," Progress inCryptology -AFRICACRYPT2018, AFRICACRYPT 2018, pp. 282-305,Apr. 2018. |
4 | J. Bos et al., "CRYSTALS - Kyber:ACCA-Secure Module-Lattice-BasedKEM," 2018 IEEE EuropeanSymposium on Security and Privacy(EuroS&P), pp. 353-367, Apr. 2018. |
5 | C. Liu, Z. Zheng, G. Zou, "Key Reuse Attack on New Hope Key Exchange Protocol," Information Security and Cryptology - ICISC 2018, ICISC2018,pp. 163-176, Jan. 2019. |
6 | X. Lu et al., "LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus," IACR ePrint 2018-1009, Oct. 2018. |
7 | S. Okada, Y. Wang, "Recovery Attackon Bob's Reused Randomnessin CRYSTALS-KYBER and SABER," Provable and Practical Security,ProvSec 2021, pp. 155-173, Nov. 2021. |
8 | E. Rescorla, "The Transport LayerSecurity (TLS) protocol version1.3," RFC 8446, Aug. 2018. |
9 | P.W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantumcomputer," SIAM Journal Computing,vol. 26, no. 5, pp. 1484-1509, Oct.1997. DOI |