首页> 外文期刊>Computers, IEEE Transactions on >Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols
【24h】

Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols

机译:基于格的签名方案和密钥交换协议的循环中止故障

获取原文
获取原文并翻译 | 示例

摘要

Although postquantum cryptography is of growing practical concern, not many works have been devoted to implementation security issues related to postquantum schemes. In this paper, we look in particular at fault attacks against implementations of lattice-based signatures and key exchange protocols. For signature schemes, we are interested both in Fiat-Shamir type constructions (particularly BLISS, but also GLP, PASSSign, and Ring-TESLA) and in hash-and-sign schemes (particularly the GPV-based scheme of Ducas-Prest-Lyubashevsky). For key exchange protocols, we study the implementations of NewHope, Frodo, and Kyber. These schemes form a representative sample of modern, practical lattice-based signatures and key exchange protocols, and achieve a high level of efficiency in both software and hardware. We present several fault attacks against those schemes that recover the entire key recovery with only a few faulty executions (sometimes only one), show that those attacks can be mounted in practice based on concrete experiments in hardware, and discuss possible countermeasures against them.
机译:尽管后量子密码学越来越引起人们的实际关注,但针对与后量子方案相关的实现安全性问题的研究并不多。在本文中,我们特别关注针对基于格的签名和密钥交换协议的实现的故障攻击。对于签名方案,我们既对菲亚特·沙米尔(Fiat-Shamir)类型的结构(特别是BLISS,也对GLP,PASSSign和Ring-TESLA)感兴趣,并且对哈希和签名方案(特别是基于Ducas-Prest-Lyubashevsky的基于GPV的方案)感兴趣)。对于密钥交换协议,我们研究NewHope,Frodo和Kyber的实现。这些方案构成了现代的,实用的基于格的签名和密钥交换协议的代表示例,并在软件和硬件上都达到了很高的效率。我们提出了几种针对那些仅通过少数错误执行(有时只有一次)来恢复整个密钥恢复的方案的故障攻击,表明可以在硬件的具体实验的基础上在实践中安装这些攻击,并讨论针对这些方案的可能对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号