Paper 2019/271

A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding, Chi Cheng, and Yue Qin

Abstract

In this paper, we present a simple attack on LWE and Ring LWE encryption schemes used directly as Key Encapsulation Mechanisms (KEMs). This attack could work due to the fact that a key mismatch in a KEM is accessible to an adversary. Our method clearly indicates that any LWE or RLWE (or any similar type of construction) encryption directly used as KEM can be broken by modifying our attack method according to the respective cases.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
LWERLWEKEMkey mismatch
Contact author(s)
jintai ding @ gmail com
chengchizz @ gmail com
History
2019-03-12: received
Short URL
https://ia.cr/2019/271
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/271,
      author = {Jintai Ding and Chi Cheng and Yue Qin},
      title = {A Simple Key Reuse Attack on  LWE and Ring LWE  Encryption Schemes as  Key Encapsulation Mechanisms (KEMs)},
      howpublished = {Cryptology ePrint Archive, Paper 2019/271},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/271}},
      url = {https://eprint.iacr.org/2019/271}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.