Physical Protection of Lattice-Based Cryptography - Challenges and Solutions -

被引:10
作者
Khalid, Ayesha [1 ]
Oder, Tobias [2 ]
Valencia, Felipe [3 ]
Neill, Maire O' [1 ]
Gueneysu, Tim [2 ,4 ]
Regazzoni, Francesco [3 ]
机构
[1] Queens Univ Belfast, Belfast, Antrim, North Ireland
[2] Ruhr Univ Bochum, Bochum, Germany
[3] ALaRI Univ Svizzera, Italiana, Switzerland
[4] DFKI, Kaiserslautern, Germany
来源
PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18) | 2018年
基金
英国工程与自然科学研究理事会;
关键词
POWER ANALYSIS ATTACKS; COUNTERMEASURES; NTRUENCRYPT;
D O I
10.1145/3194554.3194616
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The impending realization of scalable quantum computers will have a significant impact on today's security infrastructure. With the advent of powerful quantum computers public key cryptographic schemes will become vulnerable to Shor's quantum algorithm, undermining the security current communications systems. Post-quantum (or quantum-resistant) cryptography is an active research area, endeavoring to develop novel and quantum resistant public key cryptography. Amongst the various classes of quantum-resistant cryptography schemes, lattice-based cryptography is emerging as one of the most viable options. Its efficient implementation on software and on commodity hardware has already been shown to compete and even excel the performance of current classical security public-key schemes. This work discusses the next step in terms of their practical deployment, i.e., addressing the physical security of lattice-based cryptographic implementations. We survey the state-of-the-art in terms of side channel attacks (SCA), both invasive and passive attacks, and proposed countermeasures. Although the weaknesses exposed have led to countermeasures for these schemes, the cost, practicality and effectiveness of these on multiple implementation platforms, however, remains under-studied.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 46 条
[1]  
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[2]  
[Anonymous], ADDITIVELY HOMOMORPH
[3]  
[Anonymous], 2013, SAC
[4]  
[Anonymous], 1997, INT WORKSH SEC PROT
[5]  
[Anonymous], 2005, SEMIINVASIVE ATTACKS
[6]  
[Anonymous], 5 WORKSH CRYPT SEC C
[7]  
[Anonymous], 1994, P 35 ANN S FDN COMP
[8]  
[Anonymous], 2014, 2014591 CRYPT EPRINT
[9]  
[Anonymous], 2015, COMM NAT SEC ALG SUI
[10]  
Atici A.C., 2008, RFIDSEC 2008