Man in the Middle Attack on NTRU Key Exchange

A cryptographic scheme is as strong as its underlying key exchange algorithm. In this paper we explored NTRU key exchange and found that it is exposed to Man In The Middle (MITM) attack. Similar vulnerability has been found in original Diffie-Hellman key exchange and prevented using Zero Knowledge Proof (ZKP). We applied ZKP scheme to solve the lattice based NTRU key exchange MITM and found that even with ZKP, NTRU scheme is still vulnerable to MITM attacks. Implementation results confirm this vulnerability of MITM attack in NTRU key exchange algorithm with ZKP.

[1]  Ueli Maurer,et al.  Unifying Zero-Knowledge Proofs of Knowledge , 2009, AFRICACRYPT.

[2]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[3]  William Whyte,et al.  Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign , 2010, The LLL Algorithm.

[4]  J. Hoffstein,et al.  An introduction to mathematical cryptography , 2008 .

[5]  Xiaofeng Liao,et al.  NTRU-KE: A Lattice-based Public Key Exchange Protocol , 2013, IACR Cryptol. ePrint Arch..

[6]  M. K. Ibrahem Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof , 2012, 2012 International Conference on Future Communication Networks.

[7]  Shafi Goldwasser,et al.  Complexity of lattice problems - a cryptographic perspective , 2002, The Kluwer international series in engineering and computer science.

[8]  Jean-Pierre Seifert,et al.  Approximating Shortest Lattice Vectors is Not Harder Than Approximating Closest Lattice Vectors , 1999, Electron. Colloquium Comput. Complex..

[9]  Craig Costello,et al.  Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem , 2015, 2015 IEEE Symposium on Security and Privacy.