Leadbitter, Peter J.; Smart, Nigel P. Analysis of the insecurity of ECMQV with partially known nonces. (English) Zbl 1255.94061 Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 240-251 (2003). Summary: In this paper we present the first lattice attack on an authenticated key agreement protocol, which does not use a digital signature algorithm to produce the authentication. We present a two stage attack on the elliptic curve variant of MQV in which one party may recover the other party’s static private key from partial knowledge of the nonces from several runs of the protocol. The first stage reduces the attack to a hidden number problem which is partially solved by considering a closest vector problem and using Babai’s algorithm. This stage is closely related to the attack of Howgrave-Graham, Smart, Nguyen and Shparlinski on DSA but is complicated by a non-uniform distribution of multipliers. The second stage recovers the rest of the key using the baby-step/giant-step algorithm or Pollard’s Lambda algorithm and runs in time \(O(q ^{1/4})\). The attack has been proven to work with high probability and validated experimentally. We have thus reduced the security from \(O(q ^{1/2})\) down to \(O(q ^{1/4})\) when partial knowledge of the nonces is given.For the entire collection see [Zbl 1028.00038]. Cited in 2 Documents MSC: 94A60 Cryptography 94A62 Authentication, digital signatures and secret sharing PDFBibTeX XMLCite \textit{P. J. Leadbitter} and \textit{N. P. Smart}, Lect. Notes Comput. Sci. 2851, 240--251 (2003; Zbl 1255.94061) Full Text: DOI