Visible to the public Security weakness of a lattice-based key exchange protocol

TitleSecurity weakness of a lattice-based key exchange protocol
Publication TypeConference Paper
Year of Publication2018
AuthorsGupta, D. S., Biswas, G. P., Nandan, R.
Conference Name2018 4th International Conference on Recent Advances in Information Technology (RAIT)
Date Publishedmar
ISBN Number978-1-5386-3039-6
Keywordsauthentication mechanism, computing technology, cryptanalysis, cryptographic protocols, DH problem, DH-HEMTs, Diffie-Hellman problem, digital signatures, exponential attacks, grid computing, Human Behavior, information field, information technology, Key exchange, lattice cryptography, lattice-based key exchange protocol, Lattices, Lei, Liao, man-in-the-middle attack, Metrics, MITM Attack, network security field, nonDH type key exchange protocol, NTRU-ENCRYPT, NTRU-KE, NTRU-SIGN, policy-based governance, private key cryptography, Protocols, pubcrawl, public key cryptography, quantum attacks, quantum computing, resilience, Resists, Secret key, security weaknesses, telecommunication security
Abstract

A key exchange protocol is an important primitive in the field of information and network security and is used to exchange a common secret key among various parties. A number of key exchange protocols exist in the literature and most of them are based on the Diffie-Hellman (DH) problem. But, these DH type protocols cannot resist to the modern computing technologies like quantum computing, grid computing etc. Therefore, a more powerful non-DH type key exchange protocol is required which could resist the quantum and exponential attacks. In the year 2013, Lei and Liao, thus proposed a lattice-based key exchange protocol. Their protocol was related to the NTRU-ENCRYPT and NTRU-SIGN and so, was referred as NTRU-KE. In this paper, we identify that NTRU-KE lacks the authentication mechanism and suffers from the man-in-the-middle (MITM) attack. This attack may lead to the forging the authenticated users and exchanging the wrong key.

URLhttps://ieeexplore.ieee.org/document/8389018
DOI10.1109/RAIT.2018.8389018
Citation Keygupta_security_2018