Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
نویسندگان
چکیده
In this work, we are concerned with the hardening of post-quantum key encapsulation mechanisms (KEM) against side-channel attacks, a focus on comparison operation required for Fujisaki-Okamoto (FO) transform. We identify critical vulnerabilities in two proposals masked and successfully attack algorithms from TCHES 2018 2020. To do so, use first-order attacks show that advertised security properties not hold. Additionally, break higher-order secured 2020 using collision attack, which does require information. enable implementers to spot such flaws implementation or underlying algorithms, propose framework is designed test re-encryption step FO transform information leakage. Our relies specifically parametrized t-test would have identified previously mentioned comparison. can be used both itself full decapsulation implementation.
منابع مشابه
Attacking and Defending Code-based Cryptosystems
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, health, military, and entertainment. Without them, society would change in ways we can hardly imagine. Since the publication of Shor’s algorithm in 1994, however, we know that those cryptographic applications based on the problems of factoring and discrete logarithm are threatened by quantum comp...
متن کاملDeriving, Attacking and Defending the GDOI Protocol
As a part of a continued effort towards a logical framework for incremental reasoning about security, we attempted a derivational reconstruction of GDOI, the protocol proposed in IETF RFC 3547 for authenticated key agreement in group communication over IPsec. The main advantage of the derivational approach to protocols is that it tracks the way they are designed: by refining and composing basic...
متن کاملMethods of Attacking and Defending Cryptosystems
94.7 Steganography...................................................................... 1260 94.8 Key Distribution .................................................................. 1260 94.9 Key Management ................................................................. 1260 94.10 Public versus Proprietary Algorithms and Systems.......... 1260 94.11 Classic Attacks..............................
متن کاملAttacking and Defending Networked Embedded Devices
Currently, work on malware attack and defense focuses primarily on PCs. However, as lightweight computing devices with embedded operating systems become more ubiquitous, they present a new and very disturbing target for botnet developers; and as embedded devices become more integrated and networked with general-purpose computing, they can easily become the launching point for many attacks on th...
متن کاملAttacking and Defending the McEliece Cryptosystem
This paper presents several improvements to Stern’s attack on the McEliece cryptosystem and achieves results considerably better than Canteaut et al. We show that the system with the originally proposed parameters can be broken on a moderate cluster in about a week. We have implemented our attack and are carrying it out now. This paper proposes new parameters for the McEliece and Niederreiter c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2021
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2021.i3.334-359