Cargando…
Quantum Misuse Attack on Frodo
Research on the security of lattice-based public-key encryption schemes against misuse attacks is an important part of the cryptographic assessment of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization process. In particular, many NIST-PQC crypt...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9601586/ https://www.ncbi.nlm.nih.gov/pubmed/37420438 http://dx.doi.org/10.3390/e24101418 |
_version_ | 1784817102016741376 |
---|---|
author | Wang, Yaru Jiang, Haodong Ma, Zhi |
author_facet | Wang, Yaru Jiang, Haodong Ma, Zhi |
author_sort | Wang, Yaru |
collection | PubMed |
description | Research on the security of lattice-based public-key encryption schemes against misuse attacks is an important part of the cryptographic assessment of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization process. In particular, many NIST-PQC cryptosystems follow the same meta-cryptosystem. At EUROCRYPT 2019, B [Formula: see text] etu et al. mounted a classical key recovery under plaintext checking attacks (KR-PCA) and a quantum key recovery under chosen ciphertext attacks (KR-CCA). They analyzed the security of the weak version of nine submissions to NIST. In this paper, we focus on learning with error (LWE)-based FrodoPKE, whose IND-CPA security is tightly related to the hardness of plain LWE problems. We first review the meta-cryptosystem and quantum algorithm for solving quantum LWE problems. Then, we consider the case where the noise follows a discrete Gaussian distribution and recompute the success probability for quantum LWE by using Hoeffding bound. Finally, we give a quantum key recovery algorithm based on LWE under CCA attack and analyze the security of Frodo. Compared with the existing work of B [Formula: see text] etu et al., our method reduces the number of queries from [Formula: see text] to 1 with the same success probability. |
format | Online Article Text |
id | pubmed-9601586 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96015862022-10-27 Quantum Misuse Attack on Frodo Wang, Yaru Jiang, Haodong Ma, Zhi Entropy (Basel) Article Research on the security of lattice-based public-key encryption schemes against misuse attacks is an important part of the cryptographic assessment of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization process. In particular, many NIST-PQC cryptosystems follow the same meta-cryptosystem. At EUROCRYPT 2019, B [Formula: see text] etu et al. mounted a classical key recovery under plaintext checking attacks (KR-PCA) and a quantum key recovery under chosen ciphertext attacks (KR-CCA). They analyzed the security of the weak version of nine submissions to NIST. In this paper, we focus on learning with error (LWE)-based FrodoPKE, whose IND-CPA security is tightly related to the hardness of plain LWE problems. We first review the meta-cryptosystem and quantum algorithm for solving quantum LWE problems. Then, we consider the case where the noise follows a discrete Gaussian distribution and recompute the success probability for quantum LWE by using Hoeffding bound. Finally, we give a quantum key recovery algorithm based on LWE under CCA attack and analyze the security of Frodo. Compared with the existing work of B [Formula: see text] etu et al., our method reduces the number of queries from [Formula: see text] to 1 with the same success probability. MDPI 2022-10-04 /pmc/articles/PMC9601586/ /pubmed/37420438 http://dx.doi.org/10.3390/e24101418 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Wang, Yaru Jiang, Haodong Ma, Zhi Quantum Misuse Attack on Frodo |
title | Quantum Misuse Attack on Frodo |
title_full | Quantum Misuse Attack on Frodo |
title_fullStr | Quantum Misuse Attack on Frodo |
title_full_unstemmed | Quantum Misuse Attack on Frodo |
title_short | Quantum Misuse Attack on Frodo |
title_sort | quantum misuse attack on frodo |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9601586/ https://www.ncbi.nlm.nih.gov/pubmed/37420438 http://dx.doi.org/10.3390/e24101418 |
work_keys_str_mv | AT wangyaru quantummisuseattackonfrodo AT jianghaodong quantummisuseattackonfrodo AT mazhi quantummisuseattackonfrodo |