Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

Misuse resilience is an important security criterion in the evaluation of the NIST Post-quantum cryptography standardization process. In this paper, we propose new key mismatch attacks against Kyber and Saber, NIST's selected scheme for encryption and one of the finalists in the third round of the NIST competition, respectively. Our novel idea is to recover partial information of multiple secret entries in each mismatch oracle call. These multi-positional attacks greatly reduce the expected number of oracle calls needed to fully recover the secret key. They also have significance in side-channel analysis.
From the perspective of lower bounds, our new attacks falsify the Huffman bounds proposed in [Qin et al. ASIACRYPT 2021], where a one-positional mismatch adversary is assumed. Our new attacks can be bounded by the Shannon lower bounds, i.e., the entropy of the distribution generating each secret coefficient times the number of secret entries. We call the new attacks "near-optimal" since their query complexities are close to the Shannon lower bounds.
Original languageEnglish
Title of host publicationThe 14th International Conference on Post-Quantum Cryptography (PQCrypto 2023)
PublisherSpringer
Pages 291-320
Number of pages30
ISBN (Electronic)978-3-031-40003-2
ISBN (Print)978-3-031-40002-5
DOIs
Publication statusPublished - 2023
EventThe 14th International Conference on Post-Quantum Cryptography - Stamp Student Union, University of Maryland, College Park, United States
Duration: 2023 Aug 162023 Aug 18
https://pqcrypto2023.umiacs.io/

Conference

ConferenceThe 14th International Conference on Post-Quantum Cryptography
Abbreviated titlePQCrypto 2023
Country/TerritoryUnited States
CityCollege Park
Period2023/08/162023/08/18
Internet address

Subject classification (UKÄ)

  • Other Electrical Engineering, Electronic Engineering, Information Engineering

Fingerprint

Dive into the research topics of 'Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber'. Together they form a unique fingerprint.

Cite this