Paper Abstract and Keywords |
Presentation |
2019-03-08 15:20
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in the near future. Especially, the NIST promotes the standardization of post-quantum cryptography. In post-quantum cryptography, the lattice-based cryptography is the most important candidate because this is most studied. Especially, there are many NIST candidates based on the lattice theory. Lattice-based cryptography based on the Ring-LWE problem is the most important candidate because there is an efficient implementation, Number Theoretic Transform (NTT), and there are many candidates based on the Ring-LWE problem. However, there are threats of side-channel attacks when cryptography is implemented. Therefore, we must analyze the security of cryptography against side-channel attacks. There are already side-channel attacks on NTT. We focus on one of them, extracting the information of calculation in NTT. Based on this information, we propose the key recovery algorithm on lattice-based cryptography using NTT. Moreover, we discuss when our algorithm works in polynomial time in $n$, the dimension of polynomial. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Side-Channel Attacks / Lattice-Based Cryptography / Ring-LWE Problem / Number Theoretic Transform / Secret Key Recovery / / / |
Reference Info. |
IEICE Tech. Rep., vol. 118, no. 478, ISEC2018-118, pp. 229-234, March 2019. |
Paper # |
ISEC2018-118 |
Date of Issue |
2019-02-28 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IT2018-112 ISEC2018-118 WBS2018-113 |
Conference Information |
Committee |
IT ISEC WBS |
Conference Date |
2019-03-07 - 2019-03-08 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
University of Electro-Communications |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
joint meeting of IT, ISEC, and WBS |
Paper Information |
Registration To |
ISEC |
Conference Code |
2019-03-IT-ISEC-WBS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform |
Sub Title (in English) |
|
Keyword(1) |
Side-Channel Attacks |
Keyword(2) |
Lattice-Based Cryptography |
Keyword(3) |
Ring-LWE Problem |
Keyword(4) |
Number Theoretic Transform |
Keyword(5) |
Secret Key Recovery |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kento Oonishi |
1st Author's Affiliation |
The University of Tokyo (Tokyo Univ.) |
2nd Author's Name |
Noboru Kunihiro |
2nd Author's Affiliation |
The University of Tokyo (Tokyo Univ.) |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2019-03-08 15:20:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
IT2018-112, ISEC2018-118, WBS2018-113 |
Volume (vol) |
vol.118 |
Number (no) |
no.477(IT), no.478(ISEC), no.479(WBS) |
Page |
pp.229-234 |
#Pages |
6 |
Date of Issue |
2019-02-28 (IT, ISEC, WBS) |
|