Security weakness of a lattice-based key exchange protocol | IEEE Conference Publication | IEEE Xplore

Security weakness of a lattice-based key exchange protocol


Abstract:

A key exchange protocol is an important primitive in the field of information and network security and is used to exchange a common secret key among various parties. A nu...Show More

Abstract:

A key exchange protocol is an important primitive in the field of information and network security and is used to exchange a common secret key among various parties. A number of key exchange protocols exist in the literature and most of them are based on the Diffie-Hellman (DH) problem. But, these DH type protocols cannot resist to the modern computing technologies like quantum computing, grid computing etc. Therefore, a more powerful non-DH type key exchange protocol is required which could resist the quantum and exponential attacks. In the year 2013, Lei and Liao, thus proposed a lattice-based key exchange protocol. Their protocol was related to the NTRU-ENCRYPT and NTRU-SIGN and so, was referred as NTRU-KE. In this paper, we identify that NTRU-KE lacks the authentication mechanism and suffers from the man-in-the-middle (MITM) attack. This attack may lead to the forging the authenticated users and exchanging the wrong key.
Date of Conference: 15-17 March 2018
Date Added to IEEE Xplore: 21 June 2018
ISBN Information:
Conference Location: Dhanbad, India

References

References is not available for this document.