Learning Strikes Again: the Case of the DRS Signature Scheme
Yang Yu1 L´ eo Ducas2
1Tsinghua University 2Centrum Wiskunde & Informatica
Asiacrypt 2018 Brisbane, Australia
1 / 27
Learning Strikes Again: the Case of the DRS Signature Scheme Yang Yu - - PowerPoint PPT Presentation
Learning Strikes Again: the Case of the DRS Signature Scheme Yang Yu 1 eo Ducas 2 L 1 Tsinghua University 2 Centrum Wiskunde & Informatica Asiacrypt 2018 Brisbane, Australia 1 / 27 This is a cryptanalysis work... Target: DRS a NIST
1Tsinghua University 2Centrum Wiskunde & Informatica
1 / 27
2 / 27
2 / 27
2 / 27
2 / 27
2 / 27
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 3 / 27
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 4 / 27
5 / 27
5 / 27
5 / 27
6 / 27
6 / 27
1 Hash the message to a random vector m 2 Round m (using S) to v ∈ L
1 Check v ∈ L (using P) 2 Check v is close to m 7 / 27
8 / 27
8 / 27
9 / 27
9 / 27
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 10 / 27
11 / 27
11 / 27
11 / 27
12 / 27
12 / 27
13 / 27
13 / 27
13 / 27
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 14 / 27
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
15 / 27
16 / 27
16 / 27
16 / 27
16 / 27
16 / 27
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
17 / 27
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
17 / 27
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
18 / 27
x
y
x
y
x
y
x
y
19 / 27
x
y
x
y
x
y
x
y
19 / 27
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y 20 / 27
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b Si,j =1 Si,j =−1 Si,j =0
21 / 27
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b Si,j =1 Si,j =−1 Si,j =0
21 / 27
22 / 27
22 / 27
22 / 27
22 / 27
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b Si,j =1 Si,j =−1 Si,j =0
23 / 27
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b
23 / 27
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b
23 / 27
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b
23 / 27
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 24 / 27
25 / 27
25 / 27
25 / 27
26 / 27
27 / 27