Security weakness of a lattice-based key exchange protocol
Title | Security weakness of a lattice-based key exchange protocol |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Gupta, D. S., Biswas, G. P., Nandan, R. |
Conference Name | 2018 4th International Conference on Recent Advances in Information Technology (RAIT) |
Date Published | mar |
ISBN Number | 978-1-5386-3039-6 |
Keywords | authentication mechanism, computing technology, cryptanalysis, cryptographic protocols, DH problem, DH-HEMTs, Diffie-Hellman problem, digital signatures, exponential attacks, grid computing, Human Behavior, information field, information technology, Key exchange, lattice cryptography, lattice-based key exchange protocol, Lattices, Lei, Liao, man-in-the-middle attack, Metrics, MITM Attack, network security field, nonDH type key exchange protocol, NTRU-ENCRYPT, NTRU-KE, NTRU-SIGN, policy-based governance, private key cryptography, Protocols, pubcrawl, public key cryptography, quantum attacks, quantum computing, resilience, Resists, Secret key, security weaknesses, telecommunication security |
Abstract | A key exchange protocol is an important primitive in the field of information and network security and is used to exchange a common secret key among various parties. A number of key exchange protocols exist in the literature and most of them are based on the Diffie-Hellman (DH) problem. But, these DH type protocols cannot resist to the modern computing technologies like quantum computing, grid computing etc. Therefore, a more powerful non-DH type key exchange protocol is required which could resist the quantum and exponential attacks. In the year 2013, Lei and Liao, thus proposed a lattice-based key exchange protocol. Their protocol was related to the NTRU-ENCRYPT and NTRU-SIGN and so, was referred as NTRU-KE. In this paper, we identify that NTRU-KE lacks the authentication mechanism and suffers from the man-in-the-middle (MITM) attack. This attack may lead to the forging the authenticated users and exchanging the wrong key. |
URL | https://ieeexplore.ieee.org/document/8389018 |
DOI | 10.1109/RAIT.2018.8389018 |
Citation Key | gupta_security_2018 |
- Protocols
- Metrics
- MITM Attack
- network security field
- nonDH type key exchange protocol
- NTRU-ENCRYPT
- NTRU-KE
- NTRU-SIGN
- policy-based governance
- private key cryptography
- man-in-the-middle attack
- pubcrawl
- public key cryptography
- quantum attacks
- quantum computing
- resilience
- Resists
- Secret key
- security weaknesses
- telecommunication security
- Human behavior
- Computing Technology
- cryptanalysis
- Cryptographic Protocols
- DH problem
- DH-HEMTs
- Diffie-Hellman problem
- digital signatures
- exponential attacks
- grid computing
- authentication mechanism
- information field
- information technology
- Key exchange
- lattice cryptography
- lattice-based key exchange protocol
- Lattices
- Lei
- Liao