Misuse Attacks on Post-quantum Cryptosystems

Many post-quantum cryptosystems which have been proposed in the National Institute of Standards and Technology (NISI) standardization process follow the same meta-algorithm, but in different algebras or different encoding methods. They usually propose two constructions, one being weaker and the other requiring a random oracle. We focus on the weak version of nine submissions to NISI. Submitters claim no security when the secret key is used several times. In this paper, we analyze how easy it is to run a key recovery under multiple key reuse. We mount a classical key recovery under plaintext checking attacks (i.e., with a plaintext checking oracle saying if a given ciphertext decrypts well to a given plaintext) and a quantum key recovery under chosen ciphertext attacks. In the latter case, we assume quantum access to the decryption oracle.


Publié dans:
Advances In Cryptology - Eurocrypt 2019, Pt Ii, 11477, 747-776
Présenté à:
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Darmstadt, GERMANY, May 19-23, 2019
Année
Jan 01 2019
Publisher:
Cham, SPRINGER INTERNATIONAL PUBLISHING AG
ISSN:
0302-9743
1611-3349
ISBN:
978-3-030-17656-3
978-3-030-17655-6
Lien supplémentaire:
Laboratoires:




 Notice créée le 2019-09-14, modifiée le 2019-10-03

Fichiers:
Télécharger le document
PDF

Évaluer ce document:

Rate this document:
1
2
3
 
(Pas encore évalué)