On the security of LWE cryptosystem against subversion attacks
Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite th...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7329 https://ink.library.smu.edu.sg/context/sis_research/article/8332/viewcontent/On_the_Security_of_LWE_Cryptosystem_against_Subversion_Attacks.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8332 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83322022-11-02T07:04:50Z On the security of LWE cryptosystem against subversion attacks YANG, Zhichao CHEN, Rongmao LI, Chao QU, Longjiang YANG, Guomin Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite the fact that significant progresses in this line of research have been made, most of them mainly considered the classical setting, while the research gap regarding subversion attacks against post-quantum cryptography remains tremendous. Inspired by this observation, we investigate a subversion attack against existing protocol that is proved post-quantum secure. Particularly, we show an efficient way to undetectably subvert the well-known lattice-based encryption scheme proposed by Regev (STOC 2005). Our subversion enables the subverted algorithm to stealthily leak arbitrary messages to the outsider who knows the backdoor. Through theoretical analysis and experimental observations, we demonstrate that the subversion attack against the LWE encryption scheme is feasible and practical. 2020-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7329 info:doi/10.1093/comjnl/bxz084 https://ink.library.smu.edu.sg/context/sis_research/article/8332/viewcontent/On_the_Security_of_LWE_Cryptosystem_against_Subversion_Attacks.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Public Key Subversion Attack Post-Quantum Lattice Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Public Key Subversion Attack Post-Quantum Lattice Information Security |
spellingShingle |
Public Key Subversion Attack Post-Quantum Lattice Information Security YANG, Zhichao CHEN, Rongmao LI, Chao QU, Longjiang YANG, Guomin On the security of LWE cryptosystem against subversion attacks |
description |
Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite the fact that significant progresses in this line of research have been made, most of them mainly considered the classical setting, while the research gap regarding subversion attacks against post-quantum cryptography remains tremendous. Inspired by this observation, we investigate a subversion attack against existing protocol that is proved post-quantum secure. Particularly, we show an efficient way to undetectably subvert the well-known lattice-based encryption scheme proposed by Regev (STOC 2005). Our subversion enables the subverted algorithm to stealthily leak arbitrary messages to the outsider who knows the backdoor. Through theoretical analysis and experimental observations, we demonstrate that the subversion attack against the LWE encryption scheme is feasible and practical. |
format |
text |
author |
YANG, Zhichao CHEN, Rongmao LI, Chao QU, Longjiang YANG, Guomin |
author_facet |
YANG, Zhichao CHEN, Rongmao LI, Chao QU, Longjiang YANG, Guomin |
author_sort |
YANG, Zhichao |
title |
On the security of LWE cryptosystem against subversion attacks |
title_short |
On the security of LWE cryptosystem against subversion attacks |
title_full |
On the security of LWE cryptosystem against subversion attacks |
title_fullStr |
On the security of LWE cryptosystem against subversion attacks |
title_full_unstemmed |
On the security of LWE cryptosystem against subversion attacks |
title_sort |
on the security of lwe cryptosystem against subversion attacks |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2020 |
url |
https://ink.library.smu.edu.sg/sis_research/7329 https://ink.library.smu.edu.sg/context/sis_research/article/8332/viewcontent/On_the_Security_of_LWE_Cryptosystem_against_Subversion_Attacks.pdf |
_version_ |
1770576312974442496 |