首页> 外文会议>International Conference on Selected Areas in Cryptography >Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman
【24h】

Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman

机译:对量子抗性的侧通道攻击量子源性抗底栖岩

获取原文

摘要

In this paper, we present three side-channel attacks on the quantum-resistant supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol. These refined power analysis attacks target the representation of a zero value in a physical implementation of SIDH to extract bits of the secret key. To understand the behavior of these zero-attacks on SIDH, we investigate the representation of zero in the context of quadratic extension fields and isogeny arithmetic. We then present three different refined power analysis attacks on SIDH. Our first and second attacks target the Jao, De Feo, and Plut three-point Montgomery ladder by utilizing a partial-zero attack and zero-value attack, respectively. Our third attack proposes a method to break the large-degree isogeny by utilizing zero-values in the context of isogenies. The goal of this paper is to illustrate additional security concerns for an SIDH static-key user.
机译:在本文中,我们展示了三个侧面频道攻击量子抗性超晶体源性差异 - Hellman(SIDH)关键交换协议。这些精细功率分析攻击目标在SIDH的物理实现中的零值的表示来提取秘密密钥的比特。要了解对SIDH的这些零攻击的行为,我们在二次扩展字段和isegeny算术的上下文中调查零的表示。然后我们对SIDH提出了三种不同的精细功率分析攻击。我们的第一和第二次攻击通过分别利用部分零攻击和零价值攻击来定位Jao,de Feo,并促使三角蒙哥拉姆梯子。我们的第三次攻击提出了一种通过在Isogenies的背景下利用零值来打破大程度的源性的方法。本文的目标是说明SIDH静态密钥用户的额外安全问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号