On the security of LWE cryptosystem against subversion attacks

Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite th...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Zhichao, CHEN, Rongmao, LI, Chao, QU, Longjiang, YANG, Guomin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7329
https://ink.library.smu.edu.sg/context/sis_research/article/8332/viewcontent/On_the_Security_of_LWE_Cryptosystem_against_Subversion_Attacks.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8332
record_format dspace
spelling sg-smu-ink.sis_research-83322022-11-02T07:04:50Z On the security of LWE cryptosystem against subversion attacks YANG, Zhichao CHEN, Rongmao LI, Chao QU, Longjiang YANG, Guomin Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite the fact that significant progresses in this line of research have been made, most of them mainly considered the classical setting, while the research gap regarding subversion attacks against post-quantum cryptography remains tremendous. Inspired by this observation, we investigate a subversion attack against existing protocol that is proved post-quantum secure. Particularly, we show an efficient way to undetectably subvert the well-known lattice-based encryption scheme proposed by Regev (STOC 2005). Our subversion enables the subverted algorithm to stealthily leak arbitrary messages to the outsider who knows the backdoor. Through theoretical analysis and experimental observations, we demonstrate that the subversion attack against the LWE encryption scheme is feasible and practical. 2020-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7329 info:doi/10.1093/comjnl/bxz084 https://ink.library.smu.edu.sg/context/sis_research/article/8332/viewcontent/On_the_Security_of_LWE_Cryptosystem_against_Subversion_Attacks.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Public Key Subversion Attack Post-Quantum Lattice Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Public Key
Subversion Attack
Post-Quantum
Lattice
Information Security
spellingShingle Public Key
Subversion Attack
Post-Quantum
Lattice
Information Security
YANG, Zhichao
CHEN, Rongmao
LI, Chao
QU, Longjiang
YANG, Guomin
On the security of LWE cryptosystem against subversion attacks
description Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite the fact that significant progresses in this line of research have been made, most of them mainly considered the classical setting, while the research gap regarding subversion attacks against post-quantum cryptography remains tremendous. Inspired by this observation, we investigate a subversion attack against existing protocol that is proved post-quantum secure. Particularly, we show an efficient way to undetectably subvert the well-known lattice-based encryption scheme proposed by Regev (STOC 2005). Our subversion enables the subverted algorithm to stealthily leak arbitrary messages to the outsider who knows the backdoor. Through theoretical analysis and experimental observations, we demonstrate that the subversion attack against the LWE encryption scheme is feasible and practical.
format text
author YANG, Zhichao
CHEN, Rongmao
LI, Chao
QU, Longjiang
YANG, Guomin
author_facet YANG, Zhichao
CHEN, Rongmao
LI, Chao
QU, Longjiang
YANG, Guomin
author_sort YANG, Zhichao
title On the security of LWE cryptosystem against subversion attacks
title_short On the security of LWE cryptosystem against subversion attacks
title_full On the security of LWE cryptosystem against subversion attacks
title_fullStr On the security of LWE cryptosystem against subversion attacks
title_full_unstemmed On the security of LWE cryptosystem against subversion attacks
title_sort on the security of lwe cryptosystem against subversion attacks
publisher Institutional Knowledge at Singapore Management University
publishDate 2020
url https://ink.library.smu.edu.sg/sis_research/7329
https://ink.library.smu.edu.sg/context/sis_research/article/8332/viewcontent/On_the_Security_of_LWE_Cryptosystem_against_Subversion_Attacks.pdf
_version_ 1770576312974442496