Assessment of the Key-Reuse Resilience of NewHope

Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

NewHope is a suite of two efficient Ring-Learning-With-Error based key encapsulation mechanisms (KEMs) that has been proposed to the NIST call for proposals for post-quantum standardization. In this paper, we study the security of NewHope when an active adversary takes part in a key establishment protocol and is given access to an oracle, called key mismatch oracle, which indicates whether her guess of the shared key value derived by the party targeted by the attack is correct or not. This attack model turns out to be relevant in private key reuse situations since an attacker may then be able to access such an oracle repeatedly – either directly or using faults or side channels, depending on the considered instance of NewHope. Following this model we show that, by using NewHope recommended parameters, several thousands of queries are sufficient to recover the full private key with high probability. This result has been experimentally confirmed using Magma CAS implementation. While the presented key mismatch oracle attacks do not break any of the designers’ security claims for the NewHope KEMs, they provide better insight into the resilience of these KEMs against key reuse. In the case of the CPA-KEM instance of NewHope, they confirm that key reuse (e.g. key caching at server side) should be strictly avoided, even for an extremely short duration. In the case of the CCA-KEM instance of NewHope, they allow to point out critical steps inside the CCA transform that should be carefully protected against faults or side channels in case of potential key reuse.

Original languageEnglish
Title of host publicationTopics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings
EditorsMitsuru Matsui
PublisherSpringer Verlag
Pages272-292
Number of pages21
ISBN (Print)9783030126117
DOIs
Publication statusPublished - 1 Jan 2019
Externally publishedYes
EventCryptographers Track at the RSA Conference 2019, CT-RSA 2019 - San Francisco, United States
Duration: 4 Mar 20198 Mar 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11405 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceCryptographers Track at the RSA Conference 2019, CT-RSA 2019
Country/TerritoryUnited States
CitySan Francisco
Period4/03/198/03/19

Keywords

  • Active attack
  • Lattice based cryptography
  • PQ-crypto
  • Side channels

Fingerprint

Dive into the research topics of 'Assessment of the Key-Reuse Resilience of NewHope'. Together they form a unique fingerprint.

Cite this