Presentation 2019-03-08
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in the near future. Especially, the NIST promotes the standardization of post-quantum cryptography. In post-quantum cryptography, the lattice-based cryptography is the most important candidate because this is most studied. Especially, there are many NIST candidates based on the lattice theory. Lattice-based cryptography based on the Ring-LWE problem is the most important candidate because there is an efficient implementation, Number Theoretic Transform (NTT), and there are many candidates based on the Ring-LWE problem. However, there are threats of side-channel attacks when cryptography is implemented. Therefore, we must analyze the security of cryptography against side-channel attacks. There are already side-channel attacks on NTT. We focus on one of them, extracting the information of calculation in NTT. Based on this information, we propose the key recovery algorithm on lattice-based cryptography using NTT. Moreover, we discuss when our algorithm works in polynomial time in $n$, the dimension of polynomial.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Side-Channel Attacks / Lattice-Based Cryptography / Ring-LWE Problem / Number Theoretic Transform / Secret Key Recovery
Paper # IT2018-112,ISEC2018-118,WBS2018-113
Date of Issue 2019-02-28 (IT, ISEC, WBS)

Conference Information
Committee IT / ISEC / WBS
Conference Date 2019/3/7(2days)
Place (in Japanese) (See Japanese page)
Place (in English) University of Electro-Communications
Topics (in Japanese) (See Japanese page)
Topics (in English) joint meeting of IT, ISEC, and WBS
Chair Jun Muramatsu(NTT) / Atsushi Fujioka(Kanagawa Univ.) / Minoru Okada(NAIST)
Vice Chair Tadashi Wadayama(Nagoya Inst. of Tech.) / Shiho Moriai(NICT) / Shoichi Hirose(Univ. of Fukui) / Koji Ohuchi(Shizuoka Univ.) / Kenichi Takizawa(NICT)
Secretary Tadashi Wadayama(Nagano Pref Inst. of Tech.) / Shiho Moriai(UEC) / Shoichi Hirose(Tokai Univ.) / Koji Ohuchi(NICT) / Kenichi Takizawa(Ibaraki Univ.)
Assistant Takahiro Yoshida(Yokohama College of Commerce) / Kazunari Omote(Tsukuba Univ.) / Yuuji Suga(IIJ) / Ryohei Nakamura(National Defense Academy) / Duong Quang Thang(NAIST)

Paper Information
Registration To Technical Committee on Information Theory / Technical Committee on Information Security / Technical Committee on Wideband System
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Sub Title (in English)
Keyword(1) Side-Channel Attacks
Keyword(2) Lattice-Based Cryptography
Keyword(3) Ring-LWE Problem
Keyword(4) Number Theoretic Transform
Keyword(5) Secret Key Recovery
1st Author's Name Kento Oonishi
1st Author's Affiliation The University of Tokyo(Tokyo Univ.)
2nd Author's Name Noboru Kunihiro
2nd Author's Affiliation The University of Tokyo(Tokyo Univ.)
Date 2019-03-08
Paper # IT2018-112,ISEC2018-118,WBS2018-113
Volume (vol) vol.118
Number (no) IT-477,ISEC-478,WBS-479
Page pp.pp.229-234(IT), pp.229-234(ISEC), pp.229-234(WBS),
#Pages 6
Date of Issue 2019-02-28 (IT, ISEC, WBS)