عرض بسيط للتسجيلة

المؤلفLi, Haoyu
المؤلفLiu, Renzhang
المؤلفMalluhi, Qutaibah M.
المؤلفPan, Yanbin
المؤلفWang, Yongge
المؤلفXie, Tianyuan
تاريخ الإتاحة2020-05-14T09:55:44Z
تاريخ النشر2019
اسم المنشورIEEE International Symposium on Information Theory - Proceedings
المصدرScopus
الرقم المعياري الدولي للكتاب21578095
معرّف المصادر الموحدhttp://dx.doi.org/10.1109/ISIT.2019.8849397
معرّف المصادر الموحدhttp://hdl.handle.net/10576/14834
الملخصIn November 2017, Hecht and Kamlofsky submitted HK17, a quaternion(octonion)-based Diffie-Hellman key exchange protocol, to NIST post-quantum cryptography project, and thought that at least O(p8) arithmetic operations are needed for a passive adversary to recover the shared key where p is the modulo used in the scheme. Later, Bernstein and Lange pointed out that the shared key can be recovered with O(p) arithmetic operations, which implies that HK17 with small p is not secure. However, their attack does not work in practice for the scheme with sufficiently large p, although the scheme is still efficient. In this paper, we propose an attack to show that just constant arithmetic operations, or tilde O( { p} ) bit operations, are enough to recover the shared key for a passive adversary. Note that even the legal party in the protocol needs at least tilde O( { p} ) bit operations to establish the shared key. We break HK17 completely in the practical sense. - 2019 IEEE.
راعي المشروعACKNOWLEDGMENT Y. Pan was supported by the NNSF of China (No. 61572490) and by the National Center for Mathematics and Interdisciplinary Sciences, CAS.
اللغةen
الناشرInstitute of Electrical and Electronics Engineers Inc.
الموضوعCryptography
Security of data
Lattice-based cryptography
العنوانBreaking HK17 in Practice
النوعConference Paper
الصفحات1877-1881
رقم المجلد2019-July


الملفات في هذه التسجيلة

الملفاتالحجمالصيغةالعرض

لا توجد ملفات لها صلة بهذه التسجيلة.

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة