Skip to main content

Man in the Middle Attack on NTRU Key Exchange

  • Conference paper
  • First Online:
Communication, Networks and Computing (CNC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 839))

Included in the following conference series:

Abstract

A cryptographic scheme is as strong as its underlying key exchange algorithm. In this paper we explored NTRU key exchange and found that it is exposed to Man In The Middle (MITM) attack. Similar vulnerability has been found in original Diffie-Hellman key exchange and prevented using Zero Knowledge Proof (ZKP). We applied ZKP scheme to solve the lattice based NTRU key exchange MITM and found that even with ZKP, NTRU scheme is still vulnerable to MITM attacks. Implementation results confirm this vulnerability of MITM attack in NTRU key exchange algorithm with ZKP.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chi, D.P., Choi, J.W., San Kim, J., Kim, T.: Lattice based cryptography for beginners (2015)

    Google Scholar 

  2. Bos, J.W., Costello, C., Naehrig, M., Stebila, D.: Post-quantum key exchange for the TLS protocol from the ring learning with errors problem (2015)

    Google Scholar 

  3. Hoffstein, J., Howgrave-Graham, N., Pipher, J., Whyte, W.: Practical lattice-based cryptography: NTRUEncrypt and NTRUSign. In: Nguyen, P., Vallée, B. (eds.) The LLL Algorithm Information Security and Cryptography. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02295-1_11

    Chapter  MATH  Google Scholar 

  4. Hoffstein, J., Pipher, J., Silverman, J.H.: An Introduction to Mathematical Cryptography. Springer, New York (2008). https://doi.org/10.1007/978-0-387-77993-5

    Book  MATH  Google Scholar 

  5. Lei, X., Liao, X.: NTRU-KE: a lattice-based public key exchange protocol

    Google Scholar 

  6. Ibrahem, M.K.: Modification of Diffie-Hellman key exchange algorithm for zero knowledge proof. In: 2012 International Conference on Future Communication Networks, Baghdad, pp. 147–152 (2012). https://doi.org/10.1109/ICFCN.2012.6206859

  7. Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 157–175. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_11

    Chapter  Google Scholar 

  8. Ahmed, M., Sanjabi, B., Aldiaz, D., Rezaei, A., Omotunde, H.: Diffie-Hellman and its application in security protocols. Int. J. Eng. Sci. Innov. Technol. (IJESIT) 1, 69–73 (2012)

    Google Scholar 

  9. Maurer, U.: Unifying zero-knowledge proofs of knowledge. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 272–286. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02384-2_17

    Chapter  Google Scholar 

  10. Hoffstein, J., Howgrave-Graham, N., Pipher, J., Whyte, W.: An Introduction to Mathematical Cryptography, pp. 387–392. Springer, New York (2008). https://doi.org/10.1007/978-0-387-77993-5

  11. Goldreich, O., Micciancio, D., Safra, S., Seifert, J.-P.: Approximating shortest lattice vectors is not harder than approximating closest lattice vectors. Inf. Process. Lett. 71(2), 5561 (1999)

    Article  MathSciNet  Google Scholar 

  12. Micciancio, D., Goldwasser, S.: Complexity of Lattice Problems: A Cryptographic Perspective. The Kluwer International Series in Engineering and Computer Science, vol. 671. Kluwer Academic Publishers, Boston (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to S. Venkatesan or Shekhar Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yadav, V.K., Venkatesan, S., Verma, S. (2019). Man in the Middle Attack on NTRU Key Exchange. In: Verma, S., Tomar, R., Chaurasia, B., Singh, V., Abawajy, J. (eds) Communication, Networks and Computing. CNC 2018. Communications in Computer and Information Science, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-2372-0_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2372-0_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2371-3

  • Online ISBN: 978-981-13-2372-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics