Instantiation of Apon et al.'s GKE (PQCrypto 2019) and its vulnerability by key-reuse attackApon 등의 그룹키 교환 (PQCrypto 2019) 구체화 및 키 재사용 공격 취약성 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 192
  • Download : 0
A cryptosystem is used to communicate securely with the intended party on insecure channels. Before using a cryptographic system, two users or group members should perform a key exchange protocol, and then users or members can initiate a cryptographic system. Recently, as the group-based working environment, not two people, increases, the key exchange within a group becomes important. Since Burmester and Desmedt proposed group key exchange protocols in 1994, numerous researches have been conducted. Apon et al. first presented the constant round group key exchange protocol based on the lattice problem. However Apon et al. proposed the key reconciliation mechanism of protocol as general design, rather than specifically designed it. In this paper, we instantiate the Apon et al.’s protocol using the key reconciliation mechanism of NewHope, which is a two-party key exchange protocol, and analyze its correctness and security. Also, we suggest that we should be careful when applying the key reconciliation mechanism through a key-reuse attack.
Advisors
Kim, Kwangjoresearcher김광조researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2020
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2020.2,[iv, 36 p. :]

Keywords

Lattice cryptography▼aPost-quantum cryptography▼aKey exchange protocol▼aKey-reuse attack; 격자 암호▼a양자 내성 암호▼a키 교환 프로토콜▼a키 재사용 공격

URI
http://hdl.handle.net/10203/283899
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=910003&flag=dissertation
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0