Content available in repository
Content available in repository
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
We show that the NISTPQC submission HILA5 is not secure against chosen-ciphertext attacks. Specifically, we demonstrate a key-recovery attack on HILA5 using an active attack on reused keys. The attack works around the error correction in HILA5. The attack applies to the HILA5 key-encapsulation mechanism (KEM), and also to the public-key encryption mechanism (PKE) obtained by NIST’s procedure for combining the KEM with authenticated encryption. This contradicts the most natural interpretation of the IND-CCA security claim for HILA5.
Original language | English |
---|---|
Title of host publication | Progress in Cryptology - AFRICACRYPT 2018 |
Subtitle of host publication | 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings |
Editors | A. Joux, A. Nitaj, T. Rachidi |
Place of Publication | Dordrecht |
Publisher | Springer |
Pages | 203-216 |
Number of pages | 14 |
ISBN (Electronic) | 978-3-319-89339-6 |
ISBN (Print) | 978-3-319-89338-9 |
DOIs | |
Publication status | Published - 1 Jan 2018 |
Event | 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa (Africacrypt 2018) - Marrakesh, Morocco Duration: 7 May 2018 → 9 May 2018 Conference number: 10 |
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 10831 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference | 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa (Africacrypt 2018) |
---|---|
Abbreviated title | AFRICACRYPT 2018 |
Country/Territory | Morocco |
City | Marrakesh |
Period | 7/05/18 → 9/05/18 |
Research output: Book/Report › Report › Academic