Key Mismatch Attack on ThreeBears, Frodo and Round5.

Jan Vacek,Jan Václavek

ICISC(2020)

引用 2|浏览0
暂无评分
摘要
In the last years, several key reuse attacks were proposed against Round 2 candidates of the NIST Post-Quantum Cryptography Standardization Process. In these attacks, the adversary has access to the key mismatch oracle which tells her if a given ciphertext decrypts to a given message under the targeted secret key. One of the so far non-targeted candidates is ThreeBears, which is a key encapsulation mechanism based on the integer module learning with errors (I-MLWE) problem. In this paper, we present a first key mismatch attack against the ThreeBears cryptosystem. Our attack recovers the whole secret key with probability of 100% and requires about 2(11) queries on average. Besides that, we use our technique to target other Round 2 candidates Frodo and Round5, and we improve the state-of-the-art results for them.
更多
查看译文
关键词
ThreeBears,Frodo,Round5,Key mismatch attack,Post quantum cryptography,Cryptanalysis,Attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要