Title
Breaking Hk17 In Practice
Abstract
In November 2017, Hecht and Kamlofsky submitted HK17, a quaternion(octonion)-based Diffie-Hellman key exchange protocol, to NIST post-quantum cryptography project, and thought that at least O(p(8)) arithmetic operations are needed for a passive adversary to recover the shared key where p is the modulo used in the scheme. Later, Bernstein and Lange pointed out that the shared key can be recovered with (O) over tilde (p) arithmetic operations, which implies that HK17 with small p is not secure. However, their attack does not work in practice for the scheme with sufficiently large p, although the scheme is still efficient. In this paper, we propose an attack to show that just constant arithmetic operations, or (O) over tilde (log p) bit operations, are enough to recover the shared key for a passive adversary. Note that even the legal party in the protocol needs at least (O) over tilde (log p) bit operations to establish the shared key. We break HK17 completely in the practical sense.
Year
DOI
Venue
2019
10.1109/ISIT.2019.8849397
2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)
Field
DocType
Citations 
Discrete mathematics,Combinatorics,Key exchange,Modulo,Cryptography,Computer science,Quaternion,Octonion,NIST,Tilde,Adversary
Conference
0
PageRank 
References 
Authors
0.34
0
6
Name
Order
Citations
PageRank
Haoyu Li11310.81
Renzhang Liu200.68
Qutaibah M. Malluhi300.34
Yanbin Pan43513.29
Yongge Wang555856.22
Tianyuan Xie603.38