Cargando…

Quantum Misuse Attack on Frodo

Research on the security of lattice-based public-key encryption schemes against misuse attacks is an important part of the cryptographic assessment of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization process. In particular, many NIST-PQC crypt...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Yaru, Jiang, Haodong, Ma, Zhi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9601586/
https://www.ncbi.nlm.nih.gov/pubmed/37420438
http://dx.doi.org/10.3390/e24101418
_version_ 1784817102016741376
author Wang, Yaru
Jiang, Haodong
Ma, Zhi
author_facet Wang, Yaru
Jiang, Haodong
Ma, Zhi
author_sort Wang, Yaru
collection PubMed
description Research on the security of lattice-based public-key encryption schemes against misuse attacks is an important part of the cryptographic assessment of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization process. In particular, many NIST-PQC cryptosystems follow the same meta-cryptosystem. At EUROCRYPT 2019, B [Formula: see text] etu et al. mounted a classical key recovery under plaintext checking attacks (KR-PCA) and a quantum key recovery under chosen ciphertext attacks (KR-CCA). They analyzed the security of the weak version of nine submissions to NIST. In this paper, we focus on learning with error (LWE)-based FrodoPKE, whose IND-CPA security is tightly related to the hardness of plain LWE problems. We first review the meta-cryptosystem and quantum algorithm for solving quantum LWE problems. Then, we consider the case where the noise follows a discrete Gaussian distribution and recompute the success probability for quantum LWE by using Hoeffding bound. Finally, we give a quantum key recovery algorithm based on LWE under CCA attack and analyze the security of Frodo. Compared with the existing work of B [Formula: see text] etu et al., our method reduces the number of queries from [Formula: see text] to 1 with the same success probability.
format Online
Article
Text
id pubmed-9601586
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96015862022-10-27 Quantum Misuse Attack on Frodo Wang, Yaru Jiang, Haodong Ma, Zhi Entropy (Basel) Article Research on the security of lattice-based public-key encryption schemes against misuse attacks is an important part of the cryptographic assessment of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization process. In particular, many NIST-PQC cryptosystems follow the same meta-cryptosystem. At EUROCRYPT 2019, B [Formula: see text] etu et al. mounted a classical key recovery under plaintext checking attacks (KR-PCA) and a quantum key recovery under chosen ciphertext attacks (KR-CCA). They analyzed the security of the weak version of nine submissions to NIST. In this paper, we focus on learning with error (LWE)-based FrodoPKE, whose IND-CPA security is tightly related to the hardness of plain LWE problems. We first review the meta-cryptosystem and quantum algorithm for solving quantum LWE problems. Then, we consider the case where the noise follows a discrete Gaussian distribution and recompute the success probability for quantum LWE by using Hoeffding bound. Finally, we give a quantum key recovery algorithm based on LWE under CCA attack and analyze the security of Frodo. Compared with the existing work of B [Formula: see text] etu et al., our method reduces the number of queries from [Formula: see text] to 1 with the same success probability. MDPI 2022-10-04 /pmc/articles/PMC9601586/ /pubmed/37420438 http://dx.doi.org/10.3390/e24101418 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wang, Yaru
Jiang, Haodong
Ma, Zhi
Quantum Misuse Attack on Frodo
title Quantum Misuse Attack on Frodo
title_full Quantum Misuse Attack on Frodo
title_fullStr Quantum Misuse Attack on Frodo
title_full_unstemmed Quantum Misuse Attack on Frodo
title_short Quantum Misuse Attack on Frodo
title_sort quantum misuse attack on frodo
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9601586/
https://www.ncbi.nlm.nih.gov/pubmed/37420438
http://dx.doi.org/10.3390/e24101418
work_keys_str_mv AT wangyaru quantummisuseattackonfrodo
AT jianghaodong quantummisuseattackonfrodo
AT mazhi quantummisuseattackonfrodo