首页> 外文会议>IEEE International Verification and Security Workshop >Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
【24h】

Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms

机译:在量子后加密算法中检测缓存定时漏洞

获取原文

摘要

When implemented on real systems, cryptographic algorithms are vulnerable to attacks observing their execution behavior, such as cache-timing attacks. Designing protected implementations must be done with knowledge and validation tools as early as possible in the development cycle. In this article we propose a methodology to assess the robustness of the candidates for the NIST post-quantum standardization project to cache-timing attacks. To this end we have developed a dedicated vulnerability research tool. It performs a static analysis with tainting propagation of sensitive variables across the source code and detects leakage patterns. We use it to assess the security of the NIST post-quantum cryptography project submissions. Our results show that more than 80% of the analyzed implementations have at least one potential flaw, and three submissions total more than 1000 reported flaws each. Finally, this comprehensive study of the competitors security allows us to identify the most frequent weaknesses amongst candidates and how they might be fixed.
机译:当在真实系统上实施时,加密算法很容易受到观察其执行行为的攻击,例如缓存定时攻击。必须在开发周期中尽早使用知识和验证工具来设计受保护的实现。在本文中,我们提出了一种方法来评估NIST量子后标准化项目对缓存定时攻击的候选者的鲁棒性。为此,我们开发了专用的漏洞研究工具。它执行静态分析,防止敏感变量在源代码中传播,并检测泄漏模式。我们用它来评估NIST后量子密码学项目提交的安全性。我们的结果表明,超过80%的分析实现中至少有一个潜在缺陷,而三个提交的报告中每个缺陷总数超过1000个。最后,对竞争对手安全性的全面研究使我们能够确定候选人中最常见的弱点以及如何解决这些弱点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号