Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








30 Hits in 5.8 sec

Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem

Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2016 IEEE Transactions on Information Forensics and Security  
This work presents horizontal and vertical side channel analysis techniques for an implementation of the McEliece cryptosystem.  ...  Target of this side-channel attack is a state-of-the-art FPGA implementation of the efficient QC-MDPC McEliece decryption operation as presented at DATE 2014.  ...  CONCLUSION This work presents horizontal and vertical side channel analysis techniques for a state-of-the-art McEliece implementation based on quasi-cyclic MDPC codes.  ... 
doi:10.1109/tifs.2015.2509944 fatcat:qptzcmrjdvhbxju7rb2o4rpw4m

Differential Power Analysis of a McEliece Cryptosystem [chapter]

Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2015 Lecture Notes in Computer Science  
This work presents the first differential power analysis of an implementation of the McEliece cryptosystem.  ...  It consists of a combination of a differential leakage analysis during the syndrome computation followed by an algebraic step that exploits the relation between the public and private key.  ...  RS is supported by NATO's Public Diplomacy Division in the framework of "Science for Peace", Project MD.SFPP 984520.  ... 
doi:10.1007/978-3-319-28166-7_26 fatcat:4c3icv5trrdqdanvgpiein3lom

A toolbox for software optimization of QC-MDPC code-based cryptosystems [article]

Nir Drucker, Shay Gueron
2017 IACR Cryptology ePrint Archive  
It also assesses methods for side channel protection of the implementations, and their performance costs.  ...  These optimized primitives offer a useful toolbox that can be used, in various ways, by designers and implementers of QC-MDPC cryptosystems.  ...  Opinions, findings, conclusions, and recommendations, expressed in this material, are those of the author(s), and do not necessarily reflect the views of their employers and the granting agencies.  ... 
dblp:journals/iacr/DruckerG17 fatcat:n2wv7p4c5vd6boqsqcj4gwpzgq

A Centralized Key Management Scheme Based on McEliece PKC for Space Network

Jie Liu, Xiaojun Tong, Zhu Wang, Miao Zhang, Jing Ma
2020 IEEE Access  
To solve this problem, we proposed a centralized and identity-based key management scheme by using McEliece public-key cryptosystem (PKC).  ...  Furthermore, the McEliece public-key cryptosystem can resist the quantum attack and provide error correction capacity. It improves the efficiency of the group key distribution over the noisy channel.  ...  FIGURE 3 . 3 The comparison of message cost in different phase with 100 nodes.In FIGURE. 3, the horizontal axis is the simulation time, the vertical axis is the message number.  ... 
doi:10.1109/access.2020.2976753 fatcat:g7wcrtqgvzcjpejtou6os4apfe

A Study on the SCA Trends for Application to IoT Devices

Bo-Yeon Sim, Dong-Guk Han
2020 Journal of Internet Services and Information Security  
Over the past 20 years, side-channel analysis (SCA) on IC Chip has mainly taken place.  ...  In particular, single-trace attacks that only use side-channel information are actively studied; it eliminates the need for information about the input and output values of cryptographic algorithms.  ...  Acknowledgments This work was supported as part of Military Crypto Research Center (UD170109ED) funded by Defense Acquisition Program Administration (DAPA) and Agency for Defense Development (ADD).  ... 
doi:10.22667/jisis.2020.02.29.002 dblp:journals/jisis/SimH20 fatcat:4sjvs66efzfctfw3v5emu7yezi

Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece

Rosario Arjona, Paula López-González, Roberto Román, Iluminada Baturone
2023 Applied Sciences  
based on the Classic McEliece public-key encryption algorithm, which is a round 4 candidate of the NIST post-quantum standardization process.  ...  A practical implementation of a non-device-centric facial authentication system is illustrated based on the generation and comparison of protected FaceNet embeddings.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app13020757 fatcat:25vbubapkfgsfbrsrlaawfadaa

Noise Modulation-Based Reversible Data Hiding with McEliece Encryption

Zexi Wang, Minqing Zhang, Yongjun Kong, Yan Ke, Fuqiang Di, Xuehu Yan
2022 Security and Communication Networks  
McEliece cryptosystem is expected to be the next generation of the cryptographic algorithm due to its ability to resist quantum computing attacks.  ...  In this article, we analysed and proved that there is a redundancy in the McEliece encryption process that is suitable for embedding.  ...  Acknowledgments is work was supported by the National Natural Science Foundation of China, under grants nos. 61872384, 62102450, 62102451, and 62202496.  ... 
doi:10.1155/2022/4671799 fatcat:oeztre6dsra4tji3ju7vtgmfvu

Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography

Bo-Yeon Sim, Jihoon Kwon, Kyu Young Choi, Jihoon Cho, Aesun Park, Dong-Guk Han
2019 Transactions on Cryptographic Hardware and Embedded Systems  
This countermeasure was later found to become vulnerable to a differential power analysis (DPA) in private syndrome computation, as described by Rossi et al. at CHES 2017.  ...  Our experiments show that the BIKE and LEDAcrypt may become vulnerable to our proposed attacks.  ...  We also thank Dukjae Moon of Samsung SDS for his valuable feedback and many helpful discussions.  ... 
doi:10.13154/tches.v2019.i4.180-212 dblp:journals/tches/SimKCCPH19 fatcat:yurx2sk42bdabpnirggnnds4fe

Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research [article]

Ritik Bavdekar, Eashan Jayant Chopde, Ashutosh Bhatia, Kamlesh Tiwari, Sandeep Joshua Daniel, Atul
2022 arXiv   pre-print
cryptography standardization process, and finally provides a couple of future research directions in this field.  ...  Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES.  ...  More analysis on floatingpoint operations causing errors and side-channel attacks have to be done. Also, more study on its sampler has to be done.  ... 
arXiv:2202.02826v1 fatcat:ghq4lqiu4rf5vpuv6gbk7ws4jm

Integer Syndrome Decoding in the Presence of Noise [article]

Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso
2022 IACR Cryptology ePrint Archive  
A recent line of work considers augmented versions of this strategy, with hints typically provided by side-channel information.  ...  We provide experimental results on cryptographic parameters for the BIKE and Classic McEliece cryptosystems, which are finalist and alternate candidates for the third round of the NIST standardization  ...  the SDP, for which additional information is available, for instance via side-channel analysis on implementations of the aforementioned cryptosystems.  ... 
dblp:journals/iacr/DragoiCCG22 fatcat:xc5u4lqq5jbmfdc4p6u3vt35sm

Joint Encryption and Error Correction Technical Research Applied an Efficient Turbo Code

Jianbin Yao, Jianhua Liu, Yang Yang
2015 International Journal of Security and Its Applications  
Through the combination of encryption technology and channel coding technology and performance by one step, we will build a joint encryption error correction (JEEC) encoding scheme and a comprehensive  ...  the encryption technology and channel coding technology and achieved by one step[9], making it a comprehensive technical program and applied to information transmission.  ...  The authors would like to thank the editor and reviewer for the helpful comments on the manuscripts.  ... 
doi:10.14257/ijsia.2015.9.10.03 fatcat:uu4ha3to7rce7nytl6o6qoxbxe

Rank-Metric Codes and Their Applications [article]

Hannes Bartz, Lukas Holzbaur, Hedongliang Liu, Sven Puchinger, Julian Renner, Antonia Wachter-Zeh
2022 arXiv   pre-print
Codes designed for the rank metric have attracted considerable attention in recent years, reinforced by network coding and further motivated by a variety of applications.  ...  This survey gives a general introduction to rank-metric codes, explains their most important applications, and highlights their relevance to these areas of research.  ...  Acknowledgements The work of L. Holzbaur and A. Wachter  ... 
arXiv:2203.12384v1 fatcat:brysqya7ynem5i25adxfwf5vl4

Quantum Computers' threat on Current Cryptographic Measures and Possible Solutions

Tohfa Niraula, Department of Computer Science and Engineering, Kathmandu University Dhulikhel, Nepal, Aditi Pokharel, Ashmita Phuyal, Pratistha Palikhel, Manish Pokharel
2022 International Journal of Wireless and Microwave Technologies  
Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities.  ...  The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum  ...  The photons on the sender side pass through a polarizer which randomly gives one of four possible combinations of four polarizations: Vertical, Horizontal, positive 45 degrees, or negative 45 degrees.  ... 
doi:10.5815/ijwmt.2022.05.02 fatcat:awmrc5h6efhnjor7yiylzaxh5q

Introduction to Quantum Cryptography [chapter]

Xiaoqing Tan
2013 Theory and Practice of Cryptography and Network Security Protocols and Technologies  
Acknowledgements This work was conducted when Xiaoqing Tan visited the University of Toronto and is supported by the NSFC 61003258.  ...  She especially thanks Hoi-Kwong Lo for the hospitality during her stay at the University of Toronto.  ...  In BB84, Alice sends Bob a sequence of photons through an insecure quantum channel, each independently chosen from one of the four polarizations-vertical, horizontal, 45-degrees and 135-degrees. 2.  ... 
doi:10.5772/56092 fatcat:g2zu3rnwwnfn5akgrrpcoi675q

PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms [article]

Jungmin Park, N. Nalla Anandakumar, Dipayan Saha, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor
2022 IACR Cryptology ePrint Archive  
It specifies ease of protection against side-channel analysis (SCA) as an essential selection criterion.  ...  Following this trend, in this paper, we evaluate side-channel leakages of existing PQC implementations using PQC-SEP, a completely automated side-channel evaluation platform at both pre-and post-silicon  ...  In [HCY20] , various side-channel techniques, such as vertical correlation power analysis, horizontal in-depth correlation power analysis (HICPA), online template attacks, and chosen-input simple power  ... 
dblp:journals/iacr/ParkASMPRFT22 fatcat:raohv4kwsrbjrefacmbcjmcfs4
« Previous Showing results 1 — 15 out of 30 results