[Resource Topic] 2022/1125: A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack

Welcome to the resource topic for 2022/1125

Title:
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack

Authors: Daniel J. Bernstein

Abstract:

This paper presents an efficient attack that, in the standard IND-CCA2 attack model plus a one-time single-bit fault, recovers the NTRU-HRSS session key. This type of fault is expected to occur for many users through natural DRAM bit flips. In a multi-target IND-CCA2 attack model plus a one-time single-bit fault, the attack recovers every NTRU-HRSS session key that was encapsulated to the targeted public key before the fault. Software carrying out the full multi-target attack, using a simulated fault, is provided for verification. This paper also explains how a change in NTRU-HRSS in 2019 enabled this attack.

ePrint: https://eprint.iacr.org/2022/1125

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .