Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments

https://doi.org/10.1016/j.jisa.2021.102889Get rights and content

Abstract

Recent advances in quantum computers challenge the security of key agreement protocol that are designed with the intractability assumptions of discrete logarithmic problem and integer factorization problem. Hence, motivated to develop the key agreement protocol that is secure in post-quantum era, recently Islam proposed a provably secure two-party authenticated key agreement (2PAKA) protocol. The protocol is based on the intractability assumption of the famous Ring Learning With Error (RLWE) problem. In this work, we show that Islam’s two-party key agreement is vulnerable to the modified version of the signal leakage attack (SLA) which is termed as improved-signal leakage attack (i-SLA) in this article. Using i-SLA, the attacker can successfully recover the long term private key of the honest user by instantiating utmost q number of key exchange sessions with the honest user using q number of malformed public keys. To overcome the attack, we provide a countermeasure without changing the original design of the protocol.

Introduction

Recently, Islam [1] proposed the provably secure two-party authenticated key agreement (2PAKA) protocol for post-quantum environments. The protocol has been designed with intractability assumption of the popular Ring Learning With Error (RLWE) problem [2]. The provable security of the protocol is proved using the Random Oracle Model (ROM) and it reuses the public/private keys of the two-parties involved in the key exchange. Key reuse is an important feature that saves the computation and communication overheads and is vastly employed in a majority of TLS (Transport Layer Security) connections. Despite its overhead benefits, this feature generates the security issue for the RLWE-based key agreement protocols when deployed in real-world scenarios.

Kirkwood et al. [3] are the first ones to reveal the vulnerability in RLWE-based key agreement protocols which reuse the public/private key pairs. The work in [3] emphasizes the fact that the RLWE-based protocols which reuse the public/private keys leaks the information of recipient’s private key and there is a need for public-key validation to combat this vulnerability. Although this work has alarmed the cryptographers against the reuse of public/private keys for RLWE-based key agreement protocols but it does not provide the concrete description of the attack to exploit the vulnerability. In 2016, Fluhrer [4] proposed the key mismatch attack against the RLWE-based key agreement protocols which reuse the public/private keys. The idea behind the attack is to derive information about the private key of the honest party according to the match or mismatch of the final shared key. However, the attack will not work against the key agreement protocols where the final shared keys have been derived from LSB (Least Significant Bits) of the approximately equal keys computed by both parties, for example, the attack will not work against Ding et al.’s [5] key agreement protocol.

Taking ideas from the above-discussed attacks, Ding et al. [6] in 2017, proposed the SLA (Signal Leakage Attack) against the RLWE-based key agreement protocols which reuse the public/private key pair. In this attack, the attacker will instantiate the multiple sessions with the honest party and analyze the output of the signal function to derive the private key of the honest party. The attack will also work against the schemes where the final shared keys have been derived from LSB (Least Significant Bits) of approximately same keys computed by both parties. Therefore, the attack will work against the Ding et al. [5] key agreement protocol. The complexity of SLA attack to recover the private key s of the honest party is 2q (where q is an odd prime number as described in notation Table 1).

In another work of Ding et al. [7], it has been shown that the SLA attack can be mounted efficiently with less number of queries. The authors in [7] suggest that it is not necessary to vary the constant k in the malformed public key of adversary looping from 0 to q1 (as done in original SLA [6]) and there are many iterations of k that can be skipped. Thus, the fewer number of queries are required to recover the private key s of the honest party. These fewer number of queries are utmost q+c (where c is a constant and q is an odd prime number as described in notation Table 1) and thus, the complexity of the SLA attack is reduced to q+c, in comparison to 2q in the original SLA attack. In section 7 of [7], authors considered two cases of basic Ding et al.’s protocol [5] to show how a fewer number of queries can successfully recover the private key of the honest party. The first case is the simplified one where the error term gB is not added by the honest party during the computation of its shared key KB. The adversary chooses its private key sA to be 0 and the corresponding public key is a constant term i.e. pA=k. The second case is the complicated one, where error term gB is added by the honest party during its shared key computation KB, and also, adversary deviates slightly from the original protocol by choosing its error term eA=1 and private key sA according to the error distribution χβ. Thus, the public key of the attacker is of the form pA=asA+k, where aRq (see the notation Table 2). The authors show that the complexity of attack for the simplified case is q2+4 and for the complicated case is q+c.

Our contributions:It is noticeable that we name the modified version of the SLA attack with reduced query complexity [7] as improved-signal leakage attack (i-SLA) for the rest of this article. In this work, we show that the Islam’s [1] key agreement protocol (2PAKA) is vulnerable to the improved-signal leakage attack (i-SLA) [7]. We show that using i-SLA, the attacker can successfully recover the reused secret of the honest party by instantiating utmost q number of key exchange sessions with the honest party using q number of malformed public keys, which are authenticated by the Certificated Authority (CA). In the end, we give the countermeasure to defend the protocol against this attack.

Section snippets

Cryptanalysis of Islam’s [1] two-party authenticated key agreement protocol (2PAKA)

This section is reserved for the cryptanalysis of Islam’s [1] two-party authenticated key agreement (2PAKA) protocol. The summary of the general notations and notations of the Islam’s protocol is given in Table 1, Table 2 respectively. The complete key agreement protocol of Islam is given in Table 3. As discussed above, Islam’s [1] key agreement protocol (2PAKA) is vulnerable to improved-signal leakage attack (i-SLA) [7]. Hence, we will now describe the method to exploit the Islam’s [1] key

Countermeasure

In this section, we provide countermeasure to improve the Islam’s two-party authenticated key agreement protocol (2PAKA) so that it can resist the improved-signal leakage attack (i-SLA). The cause of both SLA and its modified version i-SLA is the deviation from the protocol by an active adversary (which acts as one of the party in key exchange) and generating the public key in a way to recover the long term (or reused) secret key of the honest party. Thus, to resist this attack there is need of

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Vivek Dabra received the Master degree in information security from Thapar Institute of Engineering & Technology in 2016. He is currently pursuing Ph.D. in Computer Science & Engineering Department (CSED) of Thapar Institute of Engineering & Technology. His research interests are cryptography, post quantum cryptography (specifically lattice-based cryptography) and cloud security.

References (8)

There are more references available in the full text version of this article.

Vivek Dabra received the Master degree in information security from Thapar Institute of Engineering & Technology in 2016. He is currently pursuing Ph.D. in Computer Science & Engineering Department (CSED) of Thapar Institute of Engineering & Technology. His research interests are cryptography, post quantum cryptography (specifically lattice-based cryptography) and cloud security.

Dr. Anju Bala is working as an Associate Professor in the Department of Computer Science and Engineering, TIET, Patiala, India. She has more than 20 years of experience in teaching and research. She received her BE in Computer Science and Engineering from SLIET and M Tech from Punjabi University and PhD in the research area of Cloud Computing and Big data from TIET. She has more than 80 research publications in reputed Journals and Conferences and guided more than 40 ME thesis in the same area and guided Ph.D. students in the same area.

Saru Kumari is currently an Assistant Professor with the Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India. She received her Ph.D. degree in Mathematics in 2012 from the same University. She has published more than 220 research papers in reputed International journals and conferences, including 200 publications in SCI-Indexed Journals. She is on the Editorial Board of more than a dozen of International Journals of high repute including SCI-Journals under Elsevier, Springer, Wiley, etc. She served as lead/Guest Editor of four Special Issues in SCI Journals of Elsevier, Springer and Wiley. She has been on the Advisory Committee and Technical Program Committee for many International conferences. Her current research interests include information security and applied cryptography.

View full text