Misuse attacks on post-quantum cryptosystems

24Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many post-quantum cryptosystems which have been proposed in the National Institute of Standards and Technology (NIST) standardization process follow the same meta-algorithm, but in different algebras or different encoding methods. They usually propose two constructions, one being weaker and the other requiring a random oracle. We focus on the weak version of nine submissions to NIST. Submitters claim no security when the secret key is used several times. In this paper, we analyze how easy it is to run a key recovery under multiple key reuse. We mount a classical key recovery under plaintext checking attacks (i.e., with a plaintext checking oracle saying if a given ciphertext decrypts well to a given plaintext) and a quantum key recovery under chosen ciphertext attacks. In the latter case, we assume quantum access to the decryption oracle.

Cite

CITATION STYLE

APA

Băetu, C., Durak, F. B., Huguenin-Dumittan, L., Talayhan, A., & Vaudenay, S. (2019). Misuse attacks on post-quantum cryptosystems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11477 LNCS, pp. 747–776). Springer Verlag. https://doi.org/10.1007/978-3-030-17656-3_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free