On the Security of LWE Cryptosystem against Subversion Attacks

Author:

Yang Zhichao1,Chen Rongmao1,Li Chao12,Qu Longjiang2,Yang Guomin3

Affiliation:

1. 410000 College of Computer, National University of Defence Technology, Hunan, Changsha, P. R. China

2. 410000 College of Liberal Arts and Sciences, National University of Defence Technology, Hunan, Changsha, P. R. China

3. 2500 School of Computing and Information Technology, University of Wollongong, Wollongong, Australia

Abstract

Abstract Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite the fact that significant progresses in this line of research have been made, most of them mainly considered the classical setting, while the research gap regarding subversion attacks against post-quantum cryptography remains tremendous. Inspired by this observation, we investigate a subversion attack against existing protocol that is proved post-quantum secure. Particularly, we show an efficient way to undetectably subvert the well-known lattice-based encryption scheme proposed by Regev (STOC 2005). Our subversion enables the subverted algorithm to stealthily leak arbitrary messages to the outsider who knows the backdoor. Through theoretical analysis and experimental observations, we demonstrate that the subversion attack against the LWE encryption scheme is feasible and practical.

Funder

National Key R&D Program of China

National Natural Science Foundation of China

Young Elite Scientists Sponsorship Program by CAST

Science Research Plan Program by NUDT

Publisher

Oxford University Press (OUP)

Subject

General Computer Science

Reference44 articles.

1. Revealed: how US and UK spy agencies defeat internet privacy and security;Ball;The Guardian,2013

2. NSA able to foil basic safeguards of privacy on web;Larson;The New York Times,2013

3. No place to hide: Edward Snowden, the NSA, and the US surveillance state;Greenwald;Intell. Natl. Secur.,2014

4. Kleptography: using cryptography against cryptography;Young,1997

5. The dark side of “black-box” cryptography or: should we trust capstone?;Young,1996

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs;Proceedings of the Great Lakes Symposium on VLSI 2024;2024-06-12

2. Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Postquantum Signature Schemes;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-02

3. A Combination Reduction Algorithm and Its Application;Network and System Security;2022

4. Linearly Homomorphic Signatures from Lattices;The Computer Journal;2020-11-27

5. Modified multi-key fully homomorphic encryption based on NTRU cryptosystem without key-switching;Tsinghua Science and Technology;2020-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3