[Resource Topic] 2017/1214: HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction

Welcome to the resource topic for 2017/1214

Title:
HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction

Authors: Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny

Abstract:

We show that the NISTPQC submission HILA5 is not secure against chosen-ciphertext attacks. Specifically, we demonstrate a key-recovery attack on HILA5 using an active attack on reused keys. The attack works around the error correction in HILA5. The attack applies to the HILA5 key-encapsulation mechanism (KEM), and also to the public-key encryption mechanism (PKE) obtained by NIST’s procedure for combining the KEM with authenticated encryption. This contradicts the most natural interpretation of the IND-CCA security claim for HILA5.

ePrint: https://eprint.iacr.org/2017/1214

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .