Filters








7 Hits in 5.5 sec

An upper bound on the decryption failure rate of static-key NewHope [article]

John M. Schanck
2020 IACR Cryptology ePrint Archive  
We give a new proof that the decryption failure rate of NewHope512 is at most 2 −398.8 .  ...  We demonstrate our technique on some subsets of the NewHope1024 key space, and we identify a large subset of NewHope1024 keys with failure rates of no more than 2 −439.5 .  ...  We prove an upper bound on the probability that a fixed NewHope key fails to decrypt a random honestly generated ciphertext.  ... 
dblp:journals/iacr/Schanck20 fatcat:cdgjhlowq5g33bwu5judb2hqgm

Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks [article]

Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020 IACR Cryptology ePrint Archive  
(KEM) -NewHope, Kyber, Saber, Round5 and LAC that are currently competing in the second round of NIST's standardization process for postquantum cryptography.  ...  We report an important implementation vulnerability exploitable through physical attacks for message recovery in five lattice-based public-key encryption schemes (PKE) and Key Encapsulation Mechanisms  ...  Some schemes such as LAC and variants of Round5 that utilize error correcting codes to artificially reduce the decryption failure rate.  ... 
dblp:journals/iacr/RaviBRC20 fatcat:67gvcwe6i5gwlhcbd4g54fnbba

Gladius: LWR based efficient hybrid public key encryption with distributed decryption [article]

Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart
2021 IACR Cryptology ePrint Archive  
This is because the DEM needs to be decrypted under the key encapsulated by the KEM, before the whole ciphertext is declared valid.  ...  Standard hybrid encryption schemes based on the KEM-DEM framework are hard to implement efficiently in a distributed manner whilst maintaining the CCA security property of the scheme.  ...  in relation to Learning-with-Rounding, Andrej Bogdanov for clarifying issues related to the theoretical reductions between LWE and LWR, and Ward Beullens on comments on an earlier draft.  ... 
dblp:journals/iacr/CongCMS21 fatcat:7nfhfoflsfgnpk67dhcbk5zcrm

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan
2021 Cryptography  
Some potential research directions that are yet to be explored in code-based cryptography research from the perspective of codes is a key contribution of this paper.  ...  The emergence of quantum computing poses a major threat to the modern cryptosystems based on modular arithmetic, whereby even the computationally hard problems which constitute the strength of the modular  ...  Acknowledgments: This research work has been carried out under the leadership of the Institute for Technological Research SystemX, and therefore granted within the scope of the program "Recherche Exploratoire  ... 
doi:10.3390/cryptography5040038 fatcat:wkb43zunwjagbnljc6brfou4ty

Post-quantum WireGuard [article]

Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, Ralf Zimmermann
2020 IACR Cryptology ePrint Archive  
In this paper we present PQ-WireGuard, a postquantum variant of the handshake in the WireGuard VPN protocol (NDSS 2017).  ...  To achieve this, we replace the Diffie-Hellman-based handshake by a more generic approach only using key-encapsulation mechanisms (KEMs).  ...  Paterson for helpful discussions and the L A T E X sources of their proof. We would also like to thank the anonymous reviewers for valuable comments.  ... 
dblp:journals/iacr/HulsingNSWZ20 fatcat:fqn7ojrkxra3jltce7v5sgpm74

A Survey on RISC-V Security: Hardware and Architecture [article]

Tao Lu
2021 arXiv   pre-print
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors are the processing engines of smart IoT devices.  ...  In order to fill this research gap, this paper presents an in-depth survey on RISC-V security technologies.  ...  region's upper bound to be naturally-aligned power of two, 30 * which is determined by the value of A.  ... 
arXiv:2107.04175v1 fatcat:hr6avyprj5dvpav2pvnmfmvg2a

On the Transition to Post-Quantum Cryptography in the Industrial Internet of Things

Sebastian Paul
2022
With new cryptography standards on the horizon, one of the first domains expected to adopt these new standards are industrial control systems (ICS).  ...  First, we propose cryptographic agility as one of the most important prerequisites for the transition to PQC.  ...  Decryption failures potentially occur in Saber, Kyber, and NewHope. The analysis of such errors is tedious and must be taken into account in implementations.  ... 
doi:10.26083/tuprints-00021368 fatcat:sh7lyimvzbdpzfbvw5crl6567i