2020
DOI: 10.1007/978-3-030-57808-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Classical Misuse Attacks on NIST Round 2 PQC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…They utilized a non-adaptive approach to query the decapsulation device with chosen-ciphertexts, thereby using 5 ciphertexts to recover a single coefficient in [−2, 2], which is clearly suboptimal. Thus, subsequent works [BDHD + 19,HDV20] proposed improved adaptive attacks to reduce the number of queries for key recovery. The most recent work of Qin et al [QCZ + 21] proposed a systematic approach to find the lower bounds for the number of queries.…”
Section: Optimizing the Number Of Queries For Key-recoverymentioning
confidence: 99%
“…They utilized a non-adaptive approach to query the decapsulation device with chosen-ciphertexts, thereby using 5 ciphertexts to recover a single coefficient in [−2, 2], which is clearly suboptimal. Thus, subsequent works [BDHD + 19,HDV20] proposed improved adaptive attacks to reduce the number of queries for key recovery. The most recent work of Qin et al [QCZ + 21] proposed a systematic approach to find the lower bounds for the number of queries.…”
Section: Optimizing the Number Of Queries For Key-recoverymentioning
confidence: 99%
“…We now review the KR-PCA against LightSaber in Round 3 [HV20], which consists of two phases. Following the computation of [HV20], for the input (c 1 , c 2 ), the decryption algorithm computes…”
Section: Kr-pca For Lightsabermentioning
confidence: 99%
“…The proposed SCA can be mounted on Kyber and Saber as there is similar KR-PCA using sparse ciphertexts and plaintext-checking oracle against them as that against FrodoKEM. Against Kyber, the proposed SCA can recover the secret key on the basis of key-recovery attack against Kyber-512 in Round 2 following the approach of Huguenin-Dumittan and Vaudenay [HV20] (precisely, we use the extended version in Xagawa et al [XIU + 21]). Against Saber, the proposed SCA recovers the secret key on the basis of the adaptive attack in Huguenin-Dumittan and Vaudenay [HV20] for LightSaber and the attack by Osumi et al [OUKT21] for Saber and FireSaber.…”
Section: Kyber and Sabermentioning
confidence: 99%
“…Against Kyber, the proposed SCA can recover the secret key on the basis of key-recovery attack against Kyber-512 in Round 2 following the approach of Huguenin-Dumittan and Vaudenay [HV20] (precisely, we use the extended version in Xagawa et al [XIU + 21]). Against Saber, the proposed SCA recovers the secret key on the basis of the adaptive attack in Huguenin-Dumittan and Vaudenay [HV20] for LightSaber and the attack by Osumi et al [OUKT21] for Saber and FireSaber. In all cases, the decrypted plaintext will be 0 or a unit vector 0 i−1 1 0 −i−1 .…”
Section: Kyber and Sabermentioning
confidence: 99%
See 1 more Smart Citation