Affiliation:
1. Department of Computer Science, Caucasus University, Tbilisi 0102, Georgia
Abstract
Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised. Kyber is a post-quantum encryption technique that depends on lattice problem hardness, and it was recently standardized. Despite extensive testing by the National Institute of Standards and Technology (NIST), new investigations have demonstrated the effectiveness of CRYSTALS-Kyber attacks and their applicability in non-controlled environments. We investigated CRYSTALS-Kyber’s susceptibility to side-channel attacks. In the reference implementation of Kyber512, additional functions can be compromised by employing the selected ciphertext. The implementation of the selected ciphertext allows the attacks to succeed. Real-time recovery of the entire secret key is possible for all assaults.
Funder
Shota Rustaveli National Science Foundation
Reference53 articles.
1. Bernstein, D.J., Buchmann, J., and Dahmen, E. (2009). Post-Quantum Cryptography, Springer.
2. Chen, L., Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R., and Smith-Tone, D. (2016). Report on Post-Quantum Cryptography.
3. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer;Shor;SIAM Rev.,1999
4. Advantages and Challenges of QRNG Integration into Merkle;Iavich;Sci. Pract. Cyber Secur. J.,2020
5. Novel version of merkle cryptosystem;Gagnidze;Bull. Georgian Natl. Acad. Sci.,2017
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献