首页> 外文会议>International Joint Conference on e-Business and Telecommunications >Bearz Attack Falcon: Implementation Attacks with Countermeasures on the Falcon Signature Scheme
【24h】

Bearz Attack Falcon: Implementation Attacks with Countermeasures on the Falcon Signature Scheme

机译:Bearz攻击猎鹰:实施攻击猎鹰签名方案的对策

获取原文

摘要

Post-quantum cryptography is an important and growing area of research due to the threat of quantum computers, as recognised by the National Institute of Standards and Technology (NIST) recent call for standardisation. Falcon is a lattice-based signature candidate submitted to NIST, which has good performance but lacks in research with respect to implementation attacks and resistance. This research proposes the first fault attack analysis of Falcon and finds its lattice trapdoor sampler is as vulnerable to fault attacks as the GPV sampler used in alternative signature schemes. We simulate the post-processing component of this fault attack and achieve a 100% success rate at retrieving the private-key. This research then proposes an evaluation of countermeasures to prevent this fault attack and timing attacks of Falcon. We provide cost evaluations on the overheads of the proposed countermeasures which shows that Falcon has only up to 30% deterioration in performance of its key generation, and only 5% in signing, compared to runtimes without countermeasures.
机译:后量子加密是由于量子计算机威胁的重要和日益增长的研究领域,由国家标准和技术研究所(NIST)最近调用标准化的认可。 Falcon是一个基于格子的签名候选人,提交给NIST,其表现良好,但在实施攻击和阻力方面缺乏研究。本研究提出了猎鹰的第一故障攻击的分析,发现其晶格暗门采样器一样,容易受到故障作为替代签名方案中使用的GPV采样攻击。我们模拟此故障攻击的后处理组件,并在检索私钥时实现100%的成功率。然后,该研究提出了对对策的评估,以防止猎鹰的这种故障攻击和时序攻击。我们为拟议对策的开销提供成本评估,表明Falcon在其关键一代的性能下差异高达30%,而且签署只有5%,而没有对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号