计算机科学
密码系统
钥匙(锁)
明文
甲骨文公司
NIST公司
密码学
重新使用
理论计算机科学
公钥密码术
计算机安全
算法
加密
程序设计语言
生物
自然语言处理
生态学
作者
Ke Wang,Zhenfeng Zhang,Haodong Jiang,Huiqin Xie,Yanjun Li,Ying Sun,Lidong Han
标识
DOI:10.1093/comjnl/bxac176
摘要
Abstract The National Institute of Standards and Technology (NIST) has been working on standardization of post-quantum cryptography and is approaching the end of round-3 evaluation of algorithms. Key reuse security evaluation is an important part of algorithm evaluation. In order to evaluate the key reuse security of candidate IND-CPA PKEs, at Eurocrypt’19, B$\breve{\text{a}}$etu et al. proposed a classical key recovery under plaintext checking attack (KR-PCA) which can recover the reused secret keys by querying an oracle thousands of times. However, the method does not work for cryptosystems which shorten ciphertexts by rounding off the low bits, such as round-3 finalists Kyber and Saber. Subsequently, Dumittan and Vaudenay (ACNS’20) and Qin et al. (ASIACRYPT’21) came up with new effective methods, which require carefully constructed queries. In this paper, we propose an automatic method to recover the reused secret keys of IND-CPA PKEs in Kyber and Saber. Instead of constructing queries carefully, our method uses automated search combined with an optimized bruteforce. The effect and cost of the method depend on the specific parameters. In particular, we can recover the secret keys after thousands of queries in all parameter sets, which is comparable with the current best result.
科研通智能强力驱动
Strongly Powered by AbleSci AI