Nothing Special   »   [go: up one dir, main page]

Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism

View article
PeerJ Computer Science

Introduction

Public-key cryptosystems (PKC) are commonly used for essential purposes such as key sharing, authentication, and data encryption. Today, Diffie-Hellman (DH) key exchange (KE) (Diffie & Hellman, 1976) and RSA encryption/key encapsulation mechanism (KEM) (Rivest, Shamir & Adleman, 1978) are some of the widely used PKC. Shor’s algorithm (Shor, 1994) proposed a polynomial-time solution to some computationally hard problems that guarantee the security assumptions of traditional PKC. It provides a solution to integer factorization (IF) and discrete logarithm problems (DLP) in polynomial time on a sufficiently large quantum computer. The requirement for constructing post-quantum secure PKC has emerged. While it will take time to build large-scale quantum computers, many initiatives exist to obtain post-quantum secure communication. In 2016, NIST started a standardization process (National Institute of Standards and Technology (NIST), 2023) to determine the standard PKC for the post-quantum era. One of the post-quantum secure cryptosystem families is the lattice-based constructions that provides worst-case assumptions, strong security guarantees, and relatively efficient applications. The lattice-based Number Theory Research Unit (NTRU) encryption scheme was proposed by Hoffstein-Pipher-Silverman (Hoffstein, Pipher & Silverman, 1998). The security of the NTRU is based on the shortest vector problem. It provides relatively short and easy to construct keys and needs low memory with a high-speed guarantee. Many NTRU-like protocols have been proposed for today and post-quantum secure communication. Some current literature based on the NTRU is examined as follows.

The non-commutative ring structure was used in the MaTRU cryptosystem (Coglianese & Goi, 2005). The linear transformation of MaTRU provided significant speed improvements compared to the NTRU. The comparison analysis shows that MaTRU has a larger public key size than the NTRU, while the secret key size is smaller. In Stehlé & Steinfeld (2011), the secret polynomial distribution of the NTRU was changed. The obtained construction provided efficient and flexible cryptographic structures. The hardness assumption of the proposed scheme was based on the ring learning with errors (RLWE) problem. The chosen-plaintext attack (CPA) resistance of this protocol was also presented. In 2013, ETRU encryption scheme was proposed by changing the algebraic structure of the NTRU (Jarvis & Nevins, 2015). The ring structure of ETRU was obtained by using Eisenstein integers. It is faster than the NTRU since it has smaller key sizes. The security analysis showed that ETRU is secure against chosen ciphertext attacks (CCA). In Karbasi & Atani (2015), ILNTRU was constructed as a modified version of ETRU. The hardness assumption was based on the ring short integer solution (RSIS) and RLWE problems. It also provided indistinguishability under CPA (IND-CPA) resistance. In 2018, IND-CPA secure D-NTRU scheme was proposed in Wang, Lei & Hu (2018). The security of the D-NTRU was explained based on the one-way assumption of the double-encrypted NTRU version. According to the comparison results, the D-NTRU was asymptotically faster than the NTRU. Many NTRU-based cryptosystems were also proposed in the NIST’s standardization project and none was selected as a standard (National Institute of Standards and Technology (NIST), 2023). One of the NTRU-based cryptosystems is Chen et al. (2022). It was designed as a KEM that guarantees IND-CCA2 security in the random oracle model (ROM). Applying the general transformation to the deterministic PKC provided a simple, fast, and compact structure.

In the literature, two methods were generally used to construct IND-CCA2 secure KEM: NAEP transformation (Howgrave-Graham et al., 2003) and Dent construction (Dent, 2003). A pseudo-trapdoor one-way function-based padding mechanism of NAEP provided the IND-CCA2 security (Howgrave-Graham et al., 2003). Dent’s generic KEM construction contains special hash functions to obtain key derivation and masking data based on a one-way CPA secure encryption scheme (Dent, 2003). In this article, we follow the idea of Dent to obtain IND-CCA2 secure KEM as it is simple and does not require any padding mechanism. In addition, the D-NTRU encryption (Wang, Lei & Hu, 2018) was constructed using one-way hash functions that provide one-wayness against CPA security. So, the adaptation of Dent’s approach will be more suitable and simple than NAEP for producing the D-NTRU-based IND-CCA2 secure KEM.

Motivation and contribution

The design of post-quantum secure KEM is one of the significant open problems in the literature. The main aim of this article is to provide an IND-CCA2 secure KEM for this requirement. The proposed KEM is obtained following the D-NTRU encryption (Wang, Lei & Hu, 2018) and Dent’s construction (Dent, 2003). The contributions of this article are summarized as follows:

  • – This is the first IND-CCA2 secure D-NTRU-based KEM scheme constructed with a one-way encryption function.

  • – The security analysis of the proposed KEM is given in the ROM. To provide IND-CCA2 security, the hybrid version of Dent (2003) and Shoup (2001) constructions are adapted.

  • – The proposed D-NTRU KEM is a solution to the IND-CCA2 security of the D-NTRU-based encryption specified as an open problem in Wang, Lei & Hu (2018).

  • – The constructed KEM provides IND-CCA2 security without any padding mechanism or complex arithmetic operations.

  • – According to the proposed parameter set, a comparison with similar protocols is also presented.

Organization

The rest of this article is organized as follows: In Section 2, some basic definitions and assumptions are recalled. In Section 3, the proposed D-NTRU-based KEM scheme and its correctness analysis are given. The security analysis against IND-CCA2 and primal/dual attacks are presented in Section 4. The comparisons are given in Section 5. Finally, Section 6 clarifies the conclusions.

Mathematical background

The notations are summarized in Table 1.

Table 1:
Notations.
N : Dimension
Rq=Zq[x]xN1 : Polynomial ring.
q,q1,q2 : Modulo values.
: XOR operation.
: Multiplication in a polynomial ring.
xrX : x is chosen uniformly random from distribution X.
||x|| : For xR, ||x||=max1iN{xi}min1iN{xi}.
||x||2 : For xR, ||x||2=(i=1N(xix¯)2)1/2, where x¯=1Ni=1Nxi.
κZ0 : The main security parameter.
: Error message.
dZ+ : The parameter of polynomial spaces.
For D-NTRU, d=df=dg.
δ,ϕ : The failure parameters.
xp1 : The inverse of the polynomial x in mod p.
Let x=f. Then, ffp11modp.
¬Z : The complement of Z.
L(d,d) : Ternary polynomials. If xrL(d,d), then d coefficient of x is equal to 1, d coefficient of x is equal to 1, and the others are equal to 0.
Kdf : Key derivation function such that Rq2{0,1}N.
H : Hash function such that Rq1{0,1}N.
DOI: 10.7717/peerj-cs.1391/table-1

In 2018, an NTRU variant double NTRU (D-NTRU) scheme was proposed in Wang, Lei & Hu (2018). To explain the main properties of the D-NTRU, the composite NTRU (C-NTRU) was also defined. The hardness assumptions of the C-NTRU and the D-NTRU were based on the traditional NTRU scheme. Since this article aims to obtain the IND-CCA2 version of the D-NTRU, the main properties of the C-NTRU and the D-NTRU are recalled in the following.

In Wang, Lei & Hu (2018), the C-NTRU was defined to explain the idea of the D-NTRU scheme. Let p=3, q2Z+, N, and q1q be prime numbers such that gcd (q1,q2)= gcd (q1,p)=1. The C-NTRU scheme is recalled in Fig. 1.

Algorithm 1: C-NTRU encryption Wang, Lei & Hu (2018).

Figure 1: Algorithm 1: C-NTRU encryption Wang, Lei & Hu (2018).

In Fig. 1, the composite integers are used as moduli to obtain the public key. In step 7, h[i]modq1q2 is computed with the Chinese remainder theorem (CRT), where h[i]h1[i]modq1 and h[i]h2[i]modq2 for i[N]. By following the steps of the key generation function, h and (f,fp1) are generated as the public and secret keys of the C-NTRU, respectively. The ciphertext of the C-NTRU c=Fc(ϕ,m)=ϕh+mmodq1q2 is obtained by running the encryption procedure with input message mRp. In the decryption phase, c is decrypted to m with the help of the private key fp1.

Remark 1 If q1=q and q2=1, then the C-NTRU NTRU (Wang, Lei & Hu, 2018).

Based on the C-NTRU encryption, the C-NTRU one-way problem was defined in Wang, Lei & Hu (2018).

Definition 1 (The C-NTRU One-Way Problem (Wang, Lei & Hu, 2018)). Let h(X)=i[N]h[i]XiRq1q2 be the public key and c=Fc(ϕ,m)=ϕh+mRq1q2 be the ciphertext of the C-NTRU scheme, where (ϕ,m)L(d,d)×Rp. The main purpose is to find another polynomial pair (ϕ,m) under the C-NTRU function Fc that produces the ciphertext c.

The C-NTRU one-way problem was obtained by following the NTRU one-way problem (Wang, Lei & Hu, 2018).

Definition 2 (The NTRU One-Way Problem (Hoffstein, Pipher & Silverman, 1998)). Let h be the public key and c=F(ϕ,m)=hϕ+mRq be the ciphertext of the NTRU scheme, where (ϕ,m)L(d,d)×Rp. The main purpose is to find another polynomial pair (ϕ,m) under the NTRU encryption function F that produces the ciphertext c.

The hardness assumption of the NTRU one-way problem is recalled in Definition 3.

Definition 3 (The Hardness Assumption of NTRU One-Way Problem). Any probabilistic polynomial time (PPT) algorithm that solves the NTRU one-way problem is negligible for κ. In other words, for sufficiently large κ, it is impossible to develop a PPT algorithm to solve the NTRU one-way problem with a non-negligible probability (Howgrave-Graham et al., 2003).

The relation between the NTRU and the C-NTRU one-way problems is given by Fact 1.

Fact 1 Let q1>δ. Then, the C-NTRU one-way problem is reduced to the NTRU one-way problem in polynomial time (Wang, Lei & Hu, 2018, Theorem 4).

The C-NTRU ciphertext distribution problem is described in Definition 4.

Definition 4 (The C-NTRU Ciphertext Distribution Problem (Wang, Lei & Hu, 2018)). Let h(X)=i[N]h[i]XiRq1q2 be the public key of the C-NTRU scheme. The main purpose is to distinguish the distributions of uniformly random chosen ciphertext crRq1q2 and c=Fc(ϕ,m)|(ϕ,m)rL(d,d)×Rp that is produced using the C-NTRU ciphertext function Fc.

The relationship between the C-NTRU one-way problem and the ciphertext distribution is summarized Fact 2.

Fact 2 If q1>δ+2, the C-NTRU ciphertext distribution problem is reduced to the C-NTRU one-way in polynomial time (Wang, Lei & Hu, 2018, Theorem 4).

By showing reductions to the C-NTRU properties, the D-NTRU scheme was also constructed to obtain more efficient the NTRU-based public-key encryption (Wang, Lei & Hu, 2018). In the proposed scheme, double encryption is provided with the usage of twin primes. The main structure of the D-NTRU is remembered in Definition 5.

Definition 5 (The D-NTRU (Wang, Lei & Hu, 2018)). Let p=3, N, and q1+2=q2q. Then, the D-NTRU encryption scheme, using q1 and q2 twin primes, is given in Fig. 2.

Algorithm 2: D-NTRU encryption scheme.

Figure 2: Algorithm 2: D-NTRU encryption scheme.

The proposed D-NTRU was designed as a double version of the NTRU that provide one-time pad encryption. The ct component c1 allows some parameters, such as r1 and r2, to be shared and recovered, while c2 provides one-time pad-like encryption. The D-NTRU encryption scheme using q1 and q2 twin primes is given in Fig. 2.

The relation between secret polynomials and components of the D-NTRU is recalled in Corollary 1.

Corollary 1 Let f and g be secret polynomials of the D-NTRU. If ||fq11gmodq1||>2 and ||fgq11modq1||>2, the decryption of the D-NTRU scheme will not fail (Wang, Lei & Hu, 2018, Fact 1).

The conditions to prevent possible errors during the decryption phase of the D-NTRU are explained with Theorem 1.

Theorem 1 Let δ=2(pmin{2dg1,2d}+2df1). If q1>δ, there is no decryption failure in the D-NTRU (Wang, Lei & Hu, 2018, Theorem 1).

Proof 1 In the D-NTRU algorithm, the decryption parameter s=fc1modq1=f(r1h1+r2)modq1=f(r1(pfq11g)+r2)modq1=r1pg+fr2modq1 must be computed correctly to recover the message. Since q1>δ, Eq. (1) is satisfied.

||s||=||r1L(d,d)pgL(dg,dg1)+fL(df,df1)r2Rp||pmin{2dg1,2d}+min{||r2||,2df1}

Based on Theorem 1, the relation between the ciphertext and the parameters of the D-NTRU is explained with Theorem 2. Please see the detailed proof of Theorem 2 in Wang, Lei & Hu (2018).

Theorem 2. Let δ=2(pmin{2dg1,2d}+2df1) and q1>δ. Then, there is at most one (r1,r2)L(d,d)×Rp pair that satisfies c1=h1r1+r2modq1 for any c1Rq1 (Wang, Lei & Hu, 2018).

The invalid ciphertext of the D-NTRU is examined in Theorem 3. Please see the detailed proof of Theorem 3 in Wang, Lei & Hu (2018).

Theorem 3. Let q1>δ+2 and c=(c1,c2)Rq1×Rq2 be the encrypted version of the message M for (r1,r2)rL(d,d)×Rp. For any i[N], (c1+Ximodq1,c2+Ximodq1) and (c1Ximodq1,c2Ximodq1) are the invalid ciphertexts of the D-NTRU cryptosystem, where r2[i]=1 and r2[i]=1, respectively (Wang, Lei & Hu, 2018).

The distribution problem of the D-NTRU is recalled in Definition 6.

Definition 6 (The Distribution Problem of the D-NTRU (Wang, Lei & Hu, 2018)). Let (h1,h2) be the public key pair of the D-NTRU scheme. The main purpose is to distinguish the distribution of uniformly random chosen ciphertext (s1,s2)rRq1×Rq2 and the distribution of the D-NTRU ciphertext function (s1=h1r1+r2Rq1,s2=h2r1+r2Rq2)|(r1,r2)rL(d,d)×Rp.

The relation between Definitions 4 and 6 is summarized with Fact 3.

Fact 3 The D-NTRU distribution problem is reduced to the C-NTRU ciphertext distribution problem in polynomial time (Wang, Lei & Hu, 2018, Theorem 6).

The one-way property of the D-NTRU scheme is explained in Corollary 2.

Corollary 2 Let the D-NTRU distribution problem is reduced to the C-NTRU ciphertext distribution problem in polynomial time. Then, since the C-NTRU scheme provides the one-way property, the D-NTRU scheme also has the one-way property (Wang, Lei & Hu, 2018).

The main properties of the D-NTRU encryption scheme are defined by explaining its relationship with the C-NTRU and the NTRU. In this section, the relations between hard problems and their main properties are expressed to show the one-wayness property of the D-NTRU encryption. Based on Corollary 2 and Dent’s KEM construction (Dent, 2003), the proposed KEM is explained in Section 3.

Proposed scheme

In this section, the proposed D-NTRU based IND-CCA2 secure KEM is detailed. Due to the one-way structure of the D-NTRU encryption function, to obtain IND-CCA2 security, Dent’s one-way KEM construction (Dent, 2003) is added. The basic idea of obtaining the D-NTRU-based IND-CCA2 KEM is based on the modified D-NTRU encryption and Dent’s KEM components. The proposed IND-CCA2 secure D-NTRU-based KEM scheme is given in Fig. 3.

Algorithm 3: D-NTRU-based IND-CCA2 secure KEM scheme.

Figure 3: Algorithm 3: D-NTRU-based IND-CCA2 secure KEM scheme.

In Fig. 3, the public and secret keys are generated using the key generation procedure of Algorithm 3. To construct IND-CCA2 secure KEM, Dent’s KEM design idea, based on a one-way function, is used. In the encapsulation procedure of Algorithm 3, the ct components of Algorithm 2 are reevaluated in the following way.

  • c1=r1h1+r2modq1 is modified as c1=(r1+r2)h1+(pg+1)r2modq1 to prevent a IND-CCA2 based attack that is explained in Remark 3.

  • c2=r1h2+r2+Mmodq2 is changed as c2=r1h2+r2+(MH(c1))modq2 to provide one of IND-CCA2 components of Dent (2003).

The encapsulation steps are completed by computing the shared key using Kdf. To decapsulate C, r1 and r2 are recovered using secret keys (f,fp1,G). Then, the recovered message M′ is used to obtain shared key K under Kdf.

In Fig. 3, Kdf and H functions are used to ensure IND-CCA2 security (Dent, 2003; Shoup, 2001).

  1. Kdf: It is a cryptographic algorithm that derives one or more secret keys from various values using a pseudo-random function. It is modeled as ROM based on hash function properties. In the proposed KEM, Shoup (2001)’s Kdf1 function ( Rq2{0,1}N) is chosen as Kdf.

  2. H: Rq1{0,1}N: It is a hash function that provides entropy smoothing regarding security properties. For high-entropy input ciphertext byte sequences, the output is computationally indistinguishable from a random byte sequence with the same length. In the proposed scheme, SHA series hash function family and National Institute of Standards and Technology (NIST) (2022) and Shoup (2001)’s Kdf1 functions can be used depending on the choice of κ.

Correctness

The equality of keys obtained by encapsulation and decapsulation is examined in the correctness analysis of the D-NTRU KEM. In Fig. 3, if step 23 does not work correctly, the decapsulation failure consists. So, the parameters should be chosen according to Theorem 4.

Theorem 4. If q1>ϕ=2(pmin{2d,2dg1}+p(2dg1)+pmin{2df1,2dg1}+2df1), the decapsulation failure does not occur in the proposed D-NTRU KEM.

Proof 2. If the first component of the step 23 in Fig. 3 is rewritten, Eq. (2) is derived.

||fc1||Rq1||(r1L(d,d)pgL(dg,dg1)+r2Rppg+fL(df,df1)pgr2+fr2)||pmin{2d,2dg1}+pmin{||r2||,2dg1}+pmin{2df1,||r2||,2dg1}+min{||r2||,2df1}pmin{2d,2dg1}+p(2dg1)+pmin{2df1,2dg1}+2df1

Based on Theorems 1 and 2, if q1>ϕ is satisfied in the parameter selection, there will be no problem in the correctness.

Let C=(c1,c2) is rewritten with Eq. (3) to show the correctness of the D-NTRU KEM.

c1=(r1+r2)h1+(pg+1)r2modq1c2=r1h2+r2+(MH(c1))modq2

By using Eq. (3), to recover the message M, the running process of the decapsulation procedure is explained with Eqs. (4) and (5). If the step 23 of Fig. 3 is rewritten, Eq. (4) is obtained.

=(fc1modq1)fp1modp=(f((r1+r2)h1+(pg+1)r2)modq1)fp1modp=(fr1pfq11g+fr2pfq11g+fpgr2ffq111modq1,ri={1,2}pgmodp0+fr2)modq1fp1modp=r2modp

To decapsulate c1 and c2, the step 24 of Fig. 3 is reevaluated with Eq. (5).

=[G(fc1r1pg+r2pg+fpgr2+fr2fr2)]fr2r2modq1=[p1gq11(r1pg+r2pg+fpgr2+fr2fr2)]fr2r2modq1=[r1+r2+fr2]fr2r2modq1=r1modq1M=(c2(r1h2+r2))H(c1)modq2=((r1h2+r2+(MH(c1)))(r1h2+r2))H(c1)modq2MMmodq2

The relationship between modulo q1 and distribution parameter d is explained in Corollary 3.

Corollary 3 Let d=df=dg and p=3 (Wang, Lei & Hu, 2018). Based on Theorems 3 and 4, since q1>ϕ+2, q1>ϕ+2=2(pmin{2d,2dg1}+p(2dg1)+pmin{2df1,2dg1}+2df1)+2=40d18 is obtained. To prevent decapsulation failures and invalid ciphertext, d= q1+1840 must be satisfied. Then, M=M.

Security analysis of d-ntru kem

In this section, the IND-CCA2 security analysis of the proposed KEM and its resistance to some lattice-based attacks are examined.

The IND-CCA2 security of the proposed KEM

In the security analysis, the idea of IND-CCA2 secure KEM from Dent’s one-way IND-CPA secure encryption scheme (Dent, 2003) is followed. The model of IND-CCA2 security is constructed by adapting (Bogdanov, 2005; Dent, 2003; Shoup, 2001) to the D-NTRU problem. The attacker’s behaviors in the IND-CCA2 security are examined based on the game-based security analysis.

In this model, an Attacker (A), modeled as a PPT Turing machine, has the authority to run all algorithms and can obtain all communication-related media. A can also access the decapsulation oracle to decapsulate any capsulated pair. According to Dent’s KEM structure, the proposed KEM is secure unless A has a significant advantage over the Game1 against a mythical challenger.

Game1: There are three consecutive operations, such as start, challenge, and result, in the Game1. A aims to gain an advantage in the basic IND game by performing these operations. The visualization sub-steps of Game1 is given in Fig. 4. Figure 4 shows the parameters obtained during the Game1 based on the action of A. The summarized reactions of Fig. 4 are defined as follows.

The basic IND security game steps.

Figure 4: The basic IND security game steps.

  • Start: There are three sub-steps.

  • s1: Based on the security parameter κ, the key pair (pk,sk) is generated by the challenger. pk is sent to A and sk is held by the challenger.

  • s2: A runs until the challenger receives the capsulated key pair. Then, it queries the decapsulation oracle to find the key that is associated with the capsulated key. It is ready to take on a challenge when A made enough queries.

  • s3: The following steps are taken by the A when generating the encapsulated key pair for the challenger. A submits two different capsulated keys:

    • (K0,C)=Encapsulation(pk)

    • K1r{0,1}N

  • Challenge: It is completed when the following sub-steps are done.

  • c1: The challenger chooses bit φr{0,1} and sends the capsulated key (Kφ,C) to A.

  • c2: A can perform any number of additional capsulation and computations. According to the number of queries that A can do, the obtained security properties are defined as follows.

    • In the non-adaptive IND-CCA, A cannot make further requests to the decapsulation oracle before estimating φ.

    • In IND-CCA2, A can make further requests to the decapsulation oracle before the prediction, while the challenger ciphertext C cannot be submitted.

  • c3: A works until he/she generates the guess bit φ. Then, A queries the decapsulation oracle to find the ciphertext C, which is associated with the capsulated key pair.

  • Result:

  1. If φ=φ, A wins the game.

  2. Let p be the advantage of A in Game0. In Eq. (6), if p is a negligible function of κ, then the D-NTRU KEM is said to be IND-CCA2 secure.

p=Pr[φ=φ]1/2

Let’s prove that Eq. (6) is negligible in the proposed KEM with Game2.

Game2: In the IND-CCA2 KEM scheme, A can query the decapsulation oracle more than once. Following the idea of Theorem 4 in Dent (2003), the IND-CCA2 analysis of the D-NTRU KEM is examined with Theorem 5. Let;

  • |H| be the output length of H:Rq1{0,1}N.

  • T be the execution time of encryption process.

  • |M| be the space size of MRq2.

  • QD,QH, and QK be the maximum number of the decapsulation, hash and Kdf oracles queries in the ROM, respectively.

Theorem 5 Let the D-NTRU-(Key Generation, Encryption, Decryption), given in Fig. 2, be a one-way encryption scheme and the D-NTRU KEM be the KEM obtained from this encryption by following Dent’s construction. Suppose that there is an A in the ROM that can break the IND-CCA2 security with probability p in time t. Then, there is also an algorithm that inverts the underlying one-way encryption function with probability ppQD2|H| QD|M| and in time tt+(QH+QD+QK)T.

Proof 3 It is shown that if there is an A that breaks the proposed scheme with a non-negligible probability, there will be an algorithm that reverses the underlying one-way encryption scheme with a non-negligible probability. Note that it is assumed that A can query the oracle at any time in the IND-CCA2 security. The following changes are done in Game2.

The challenger selects the challenge key pair (Kφ,C) at the beginning.

  • If A queries the decapsulation oracle with input C=(C1,C2), it produces the error term at any time. The only difference compared with Game0 is that A queries the decapsulation oracle with ciphertext C before obtaining (Kφ,C). To analyze the effects of this difference on the advantage of A, adapted Lemmas 1 and 2 are used.

Lemma 1 Let Y1, Y2 and Z be an events such that Pr [Y1|¬Z] = Pr [Y2|¬Z]. Then,

|Pr[Y1]Pr[Y2]|Pr[Z]=QD|M|+QD2|H|,where |M| and |H| be the message space size and the output length of H, respectively.

Proof Let Y1 and Y2 be the events that A wins in Game1 and Game2, respectively. Note that if A wins the games, he/she can correctly guess φ from (Kφ,C), where (Kφ,C) is initially selected at just Y2. Let Z be the event that A asks to decapsulation of C before the challenge is done. If Z does not occur, A can only get the same information when querying oracles. Since, Pr [Y1|¬Z] = Pr [Y2|¬Z], |Pr[Y1]Pr[Y2]|Pr[Z] is obtained. In the IND-CCA2, the challenge ciphertext is chosen uniformly random from the possible ciphertext distribution. Since c1=(r1+r2)h1+(pg+1)r2modq1 and c2=r1h2+r2+(MH(c1))modq2, where C=(c1,c2) in the proposed KEM, decapsulation and hash oracles are queried in the event Z.

The probability that A guesses C with an decapsulation oracle query is 1|M| and hash oracle is 1|H|. Since A can make multiple queries, A can obtain decapsulation(C,sk) and C=H(decapsulation(C,sk)) with a total probability QD|M|+QD2|H|, if event Z occurs. So, Y2 is only negligibly smaller than Y1 since 1|M| and 1|H| are negligible in the one-way function.

Lemma 2 Let A has a non-negligible advantage in the Game1. Then, there will also be an A′ with a non-negligible advantage in Game2.

Proof 2 Suppose that there is an A′ who breaks KEM with probability p in Game2. He/She runs the algorithm, given in Fig. 5, to reverse the one-way D-NTRU function. At the end of Algorithm 4, the winning probability of A′ is computed. This value is equal to A′’s success in reversing the challenge ciphertext C. Let consider Step 3.b.iii in Fig. 5. The probability of obtaining the plaintext X that creates the challenging ciphertext C is equivalent to the probability that A′ wins Game2. The derivation of X includes operation steps based on Kdf and H functions. Let V be the event of querying the Kdf function with X=decapsulation(C,sk) at any time. The probability of outputting X, which is the plaintext of C, is computed with Eq. (8).

Algorithm 4: Possible queries for the security analysis.

Figure 5: Algorithm 4: Possible queries for the security analysis.

Pr[X]=Pr[V]Pr[X|V]+Pr[¬V]Pr[X|¬V]when the event V does not occur, A cannot obtain anything about kdf(X)=Decapsulation(C,sk). So, Pr[¬V]=0. Pr[V]=QD|M|+QD2|H| is obtained with Eq. (7). If Eq. (8) is rewritten, Eq. (9) is obtained.

Pr[X]=Pr[V]QD|M|+QD2|H|Pr[X|V]1+Pr[¬V]0Pr[X|¬V]Pr[V]QD|M|+QD2|H|

Since Kdf is modeled as a ROM and the D-NTRU provides one-wayness property, the total number of queries QD|M|+QD2|H| as a function of κ is negligible. Since Eq. (6) is hold, there is no an algorithm that can reverse the given C ciphertext is obtained with a negligible. So, the proposed D-NTRU-based KEM is IND-CCA2 secure.

Basic lattice-based attacks

The security of the NTRU-based protocols is related to the shortest vector problem (SVP). The primal and dual attacks can be carried out for the NTRU-like protocols, such as the D-NTRU encryption and KEM, to find the short vectors in a lattice. Therefore, the parameter set should be chosen so that it is impossible to find short vectors (Elverdi, Akleylek & Kirlar, 2022). The primal and dual attack resistance of the D-NTRU KEM is examined as follows.

  • Primal attack aims to estimate the hardness of the learning with errors (LWE)-based crptosystems. By constructing an integer embedded lattice, it tries to solve the unique short vector problem (u-SVP). In other words, it reduces the LWE problem to the unique SVP by using the embedding technique. Then, it uses Block Korkin-Zolotarev (BKZ) lattice reduction to find the shortest vector. The hardness of the core-SVP estimates the complexity of the primal attack as 20.3496b, where b is the block size of the BKZ algorithm (Liang et al., 2022). So, in the primal attack resistance of the D-NTRU-KEM algorithm, the reduced base V=(v1,,vd) is computed with the BKZ-b. In the BKZ-b algorithm, b is selected as 364 independent of parameters for n=128 bit security level in the local model (Liang et al., 2022; Hoffstein, Pipher & Silverman, 1998). Therefore, the core-SVP cost of primal attack is estimated as 0.3496×364=127 for b=364. Similarly, the estimations can be made with b=470 or b=496 for n=192 and b=612 for n=256.

  • A dual attack aims to solve the decisional-LWE problem, which provides the obtaining secret key by recovering part of the secret. This attack is made by using the BKZ algorithm in dual lattices. In the concrete hardness assumptions of NIST’s PQC standard Kyber (National Institute of Standards and Technology (NIST), 2023), dual attacks were not considered since it seems less realistic than the primal attack. Therefore, in the D-NTRU KEM algorithm, the dual attack is not considered since it is much more expensive and impracticable than the primal attack (Albrecht et al., 2018; Liang et al., 2022).

Remark 2 The man-in-the-middle (MITM) attack examination of the D-NTRU KEM is done regarding the distribution parameter of the key generation procedure. In the proposed the D-NTRU KEM, the key polynomials are chosen frL(df,df1), grL(df,df1) and rrL(d,d), where d,df,dg. Since d=df=dg in the D-NTRU-based schemes (Wang, Lei & Hu, 2018), MITM analysis is performed according to the key and message security calculations, presented in Table 2. The main security parameter is obtained by selecting the minimum key and message results.

Table 2:
Computational basics for parameters.
Primitives Properties and Components
Dimension : N Prime, dN/3
Mod : q1,q2 Twin primes
q1+2=q2
Polynomial coefficients : df=dg=d q1>40d18
Message security : ms =log2N!d!2(N2d)! bit
Key security : ks =log2N!d!(d1)!(N2d+1)! bit
Security parameter : κ=min{ms,ks}
Public key size : pk = N(log2q1+log2q2)8 byte h1Rq1
h2Rq2
Private key size : sk = 2Nlog2p+Nlog2q18 byte fRp
fp1Rp
GRq1
Packaged key pair size : ct = N(log2q1+log2q2+log22)8 byte c1Rq1
c2Rq2
KR2
DOI: 10.7717/peerj-cs.1391/table-2

Remark 3 In the IND-CCA2 security game, when a ciphertext C=(c1,c2) and key K is given, it is wanted to determine whether K is generated uniformly random or ciphertext distribution by using decapsulation oracle. A possible attack scenario in checking IND-CCA2 security is as follows:

Let the ciphertext of the message M be C and C=(c1=c1+1,c2=c2+1). Assume that the first coefficient of r2 was not 1, so that r2=r2+1 is still a ternary noise (this happens with probability at least 1/2). Then C=(c1,c2) is an encryption of M′, with noise terms r1=r1f1 and r2. Although r2=r2+1, the term r1 is unpredictable for the attacker as it contains the component belonging to the secret key. Then, even if c1 and c1 are known, M cannot be obtained from M′ since r1r1+1.

Comparison

In this section, the proposed parameter set and the comparison analysis of the D-NTRU KEM are presented. The parameter set, given in Table 3, is obtained by adapting the NTRU parameters according to the correctness and security analysis. To compare with the NTRU-based schemes, we developed a python script (Seyhan, Akleylek & Dursun, 2023) based on the D-NTRU KEM bounds and the default values of Chen et al. (2022). Table 3 presents the lattice size, modulo, distribution, and the security parameters of proposed the D-NTRU KEM for 128, 192, and 256-bit security levels.

Table 3:
Proposed parameter sets.
Parameter set
κ=ms,ks 128 192 256
Key security (KS) 128 192 256
Message security (MS) 130 193 257
N 509 677 821
q1 2,027 2,027 4,091
q2 2,029 2,029 4,093
p 3 3 3
d 23 35 48
b 364 470 or 496 612
DOI: 10.7717/peerj-cs.1391/table-3

Note:

N, lattice dimension; q1,q2,p, moduli values; d, sample distribution parameter; b, primal attack component.

The theoretical basis of the proposed KEM is explained in Table 2. Based on Table 2, the developed script (Seyhan, Akleylek & Dursun, 2023) was used to determine the suitable parameters and sizes. By following the message and key security computation, the values N and d are determined for each security level. The twin primes q1 and q2 are chosen to satisfy failure condition q1>40d18, where q1+2=q2. The ntruhps (Chen et al., 2022) values were selected as a reference for comparison.

By using Tables 2 and 3, the computed components of the D-NTRU KEM are presented in Table 4. In Table 4, the public/secret keys and ciphertext sizes are obtained in bytes using script (Seyhan, Akleylek & Dursun, 2023). Since no other D-NTRU-based IND-CCA2 KEM exists in the literature, the comparison can be made with the NTRU-based ones such as ntruhps (Chen et al., 2022). According to Table 4, the proposed KEM provides relatively larger key and ciphertext sizes for the same security level. The main parameters such as lattice size, moduli value, error bounds, parameter/message distributions, and security components that cause the differences of compared schemes are expressed in Table 5. Different hard problems and special requirements cause these differences. According to comparison analysis, the proposed method is characterized by the absence of any padding mechanism and arithmetically simple operations.

Table 4:
A comparison for the NTRU/D-NTRU-based IND-CCA2 KEM schemes.
Security level Parameters N q pk sk ct
Schemes
128 ntruhps2048509 509 2,048 699 935 699
Ours q1 = 2,027
q2 = 2,029
1,397 1,599 1,461
192 ntruhps2048677 677 2,048 930 1,234 930
Ours q1 = 2,027
q2 = 2,029
1,859 2,127 1,943
256 ntruhps4096821 821 4,096 1,230 1,590 1,230
Ours q1 = 4,091
q2 = 4,093
2,462 2,787 2,565
DOI: 10.7717/peerj-cs.1391/table-4
Table 5:
The parameter comparison for the NTRU/D-NTRU-based IND-CCA2 KEM schemes.
ntruhps (Chen et al., 2022) Ours
Assumption NTRU D-NTRU
Lattice dimension (N) Prime Prime
Modulo value (q) 2k gcd( q1,q2) = 1
gcd( q1,p) = 1
q1 prime
Error bound q822N3 q1>ϕ
SPD ( Lf) T L(d,d1)
RPD ( Lg) T(q/82) L(d,d1)
RPD ( Lr) T L(d,d)×Rp
Message distribution T Rp
IND-CCA2 structure NAEP padding One-way encryption function
DOI: 10.7717/peerj-cs.1391/table-5

Note:

SPD, secret polynomial distribution; RPD, random polynomial distribution; T, ternary polynomials; T(q), the subset of T. q/2 coefficient of T(q) is equal to 1, the remaining q/2 coefficient is equal to −1.

Conclusion

In this article, we construct a novel D-NTRU-based KEM scheme. It provides a solution to define IND-CCA2 security of the D-NTRU-based encryption, an open problem in Wang, Lei & Hu (2018). The security of the proposed KEM relies on the hardness assumption of the D-NTRU problem. Based on the one-way D-NTRU IND-CPA encryption scheme, IND-CCA2 secure D-NTRU KEM is constructed by following Dent’s KEM architecture (Dent, 2003). The detailed security analysis is done in the ROM according to modified Dent assumptions for the D-NTRU-based structures. The basic lattice-based attack evaluations are also presented. The proposed KEM is the first IND-CCA2 secure D-NTRU-based KEM in the literature. It has a simple design and the fact that it does not involve any padding mechanisms. The D-NTRU KEM trivializes the large key and ciphertext sizes. As a future work, we will focus on the D-NTRU-based KEM schemes, including methods such as NAEP padding and their security analysis in the quantum random oracle (QROM) model.

Supplemental Information

Parameter generation.

This script is used to generate the parameter set.

DOI: 10.7717/peerj-cs.1391/supp-1
1 Citation   Views   Downloads