Leakage of signal function with reused keys in RLWE key exchange

Jintai Ding, Saed Alsayigh, R. V. Saraswathy, Scott Fluhrer, Xiaodong Lin

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

47 Citations (Scopus)

Abstract

In this paper, we show that the signal function used in Ring-Learning with Errors (RLWE) key exchange could leak information to find the secret s of a reused public key p = as+2e. This work is motivated by an attack proposed in [1] and gives an insight into how public keys reused for long term in RLWE key exchange protocols can be exploited. This work specifically focuses on the attack on the KE protocol in [2] by initiating multiple sessions with the honest party and analyze the output of the signal function. Experiments have confirmed the success of our attack in recovering the secret.

Original languageEnglish
Title of host publication2017 IEEE International Conference on Communications, ICC 2017
EditorsMerouane Debbah, David Gesbert, Abdelhamid Mellouk
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467389990
DOIs
Publication statusPublished - 28 Jul 2017
Externally publishedYes
Event2017 IEEE International Conference on Communications, ICC 2017 - Paris, France
Duration: 21 May 201725 May 2017

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Conference

Conference2017 IEEE International Conference on Communications, ICC 2017
Country/TerritoryFrance
CityParis
Period21/05/1725/05/17

Keywords

  • active attacks
  • key exchange
  • key reuse
  • post quantum
  • RLWE

Fingerprint

Dive into the research topics of 'Leakage of signal function with reused keys in RLWE key exchange'. Together they form a unique fingerprint.

Cite this