IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2019-03-08 15:20
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113
Abstract (in Japanese) (See Japanese page) 
(in English) Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in the near future. Especially, the NIST promotes the standardization of post-quantum cryptography. In post-quantum cryptography, the lattice-based cryptography is the most important candidate because this is most studied. Especially, there are many NIST candidates based on the lattice theory. Lattice-based cryptography based on the Ring-LWE problem is the most important candidate because there is an efficient implementation, Number Theoretic Transform (NTT), and there are many candidates based on the Ring-LWE problem. However, there are threats of side-channel attacks when cryptography is implemented. Therefore, we must analyze the security of cryptography against side-channel attacks. There are already side-channel attacks on NTT. We focus on one of them, extracting the information of calculation in NTT. Based on this information, we propose the key recovery algorithm on lattice-based cryptography using NTT. Moreover, we discuss when our algorithm works in polynomial time in $n$, the dimension of polynomial.
Keyword (in Japanese) (See Japanese page) 
(in English) Side-Channel Attacks / Lattice-Based Cryptography / Ring-LWE Problem / Number Theoretic Transform / Secret Key Recovery / / /  
Reference Info. IEICE Tech. Rep., vol. 118, no. 478, ISEC2018-118, pp. 229-234, March 2019.
Paper # ISEC2018-118 
Date of Issue 2019-02-28 (IT, ISEC, WBS) 
ISSN Print edition: ISSN 0913-5685    Online edition: ISSN 2432-6380
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Download PDF IT2018-112 ISEC2018-118 WBS2018-113

Conference Information
Committee IT ISEC WBS  
Conference Date 2019-03-07 - 2019-03-08 
Place (in Japanese) (See Japanese page) 
Place (in English) University of Electro-Communications 
Topics (in Japanese) (See Japanese page) 
Topics (in English) joint meeting of IT, ISEC, and WBS 
Paper Information
Registration To ISEC 
Conference Code 2019-03-IT-ISEC-WBS 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform 
Sub Title (in English)  
Keyword(1) Side-Channel Attacks  
Keyword(2) Lattice-Based Cryptography  
Keyword(3) Ring-LWE Problem  
Keyword(4) Number Theoretic Transform  
Keyword(5) Secret Key Recovery  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Kento Oonishi  
1st Author's Affiliation The University of Tokyo (Tokyo Univ.)
2nd Author's Name Noboru Kunihiro  
2nd Author's Affiliation The University of Tokyo (Tokyo Univ.)
3rd Author's Name  
3rd Author's Affiliation ()
4th Author's Name  
4th Author's Affiliation ()
5th Author's Name  
5th Author's Affiliation ()
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker Author-1 
Date Time 2019-03-08 15:20:00 
Presentation Time 25 minutes 
Registration for ISEC 
Paper # IT2018-112, ISEC2018-118, WBS2018-113 
Volume (vol) vol.118 
Number (no) no.477(IT), no.478(ISEC), no.479(WBS) 
Page pp.229-234 
#Pages
Date of Issue 2019-02-28 (IT, ISEC, WBS) 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan