Abstract

Recent advances in quantum computers challenge the security of key agreement protocol that are designed with the intractability assumptions of discrete logarithmic problem and integer factorization problem. Hence, motivated to develop the key agreement protocol that is secure in post-quantum era, recently Islam proposed a provably secure two-party authenticated key agreement (2PAKA) protocol. The protocol is based on the intractability assumption of the famous Ring Learning With Error (RLWE) problem. In this work, we show that Islam’s two-party key agreement is vulnerable to the modified version of the signal leakage attack (SLA) which is termed as improved-signal leakage attack (i-SLA) in this article. Using i-SLA, the attacker can successfully recover the long term private key of the honest user by instantiating utmost q number of key exchange sessions with the honest user using q number of malformed public keys. To overcome the attack, we provide a countermeasure without changing the original design of the protocol.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.