Abstract
A cryptographic scheme is as strong as its underlying key exchange algorithm. In this paper we explored NTRU key exchange and found that it is exposed to Man In The Middle (MITM) attack. Similar vulnerability has been found in original Diffie-Hellman key exchange and prevented using Zero Knowledge Proof (ZKP). We applied ZKP scheme to solve the lattice based NTRU key exchange MITM and found that even with ZKP, NTRU scheme is still vulnerable to MITM attacks. Implementation results confirm this vulnerability of MITM attack in NTRU key exchange algorithm with ZKP.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chi, D.P., Choi, J.W., San Kim, J., Kim, T.: Lattice based cryptography for beginners (2015)
Bos, J.W., Costello, C., Naehrig, M., Stebila, D.: Post-quantum key exchange for the TLS protocol from the ring learning with errors problem (2015)
Hoffstein, J., Howgrave-Graham, N., Pipher, J., Whyte, W.: Practical lattice-based cryptography: NTRUEncrypt and NTRUSign. In: Nguyen, P., Vallée, B. (eds.) The LLL Algorithm Information Security and Cryptography. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02295-1_11
Hoffstein, J., Pipher, J., Silverman, J.H.: An Introduction to Mathematical Cryptography. Springer, New York (2008). https://doi.org/10.1007/978-0-387-77993-5
Lei, X., Liao, X.: NTRU-KE: a lattice-based public key exchange protocol
Ibrahem, M.K.: Modification of Diffie-Hellman key exchange algorithm for zero knowledge proof. In: 2012 International Conference on Future Communication Networks, Baghdad, pp. 147–152 (2012). https://doi.org/10.1109/ICFCN.2012.6206859
Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 157–175. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_11
Ahmed, M., Sanjabi, B., Aldiaz, D., Rezaei, A., Omotunde, H.: Diffie-Hellman and its application in security protocols. Int. J. Eng. Sci. Innov. Technol. (IJESIT) 1, 69–73 (2012)
Maurer, U.: Unifying zero-knowledge proofs of knowledge. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 272–286. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02384-2_17
Hoffstein, J., Howgrave-Graham, N., Pipher, J., Whyte, W.: An Introduction to Mathematical Cryptography, pp. 387–392. Springer, New York (2008). https://doi.org/10.1007/978-0-387-77993-5
Goldreich, O., Micciancio, D., Safra, S., Seifert, J.-P.: Approximating shortest lattice vectors is not harder than approximating closest lattice vectors. Inf. Process. Lett. 71(2), 5561 (1999)
Micciancio, D., Goldwasser, S.: Complexity of Lattice Problems: A Cryptographic Perspective. The Kluwer International Series in Engineering and Computer Science, vol. 671. Kluwer Academic Publishers, Boston (2002)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yadav, V.K., Venkatesan, S., Verma, S. (2019). Man in the Middle Attack on NTRU Key Exchange. In: Verma, S., Tomar, R., Chaurasia, B., Singh, V., Abawajy, J. (eds) Communication, Networks and Computing. CNC 2018. Communications in Computer and Information Science, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-2372-0_22
Download citation
DOI: https://doi.org/10.1007/978-981-13-2372-0_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2371-3
Online ISBN: 978-981-13-2372-0
eBook Packages: Computer ScienceComputer Science (R0)