Back to Search Start Over

Post-Quantum Cryptography--Having It Implemented Right.

Authors :
Guilley, Sylvain
Souissi, Youssef
ZHANG Fan
YANG Bo-Lin
Source :
Journal of Cryptologic Research (2095-7025); 2023, Vol. 10 Issue 3, p659-666, 17p
Publication Year :
2023

Abstract

Post-quantum cryptography (PQC) refers to novel requirements in asymmetric cryptography, namely key exchange, asymmetric encryption and digital signature. In PQC, the cryptographic computation shall resist not only attacks from classic computers, but also from quantum computers. Still, PQC algorithms are mathematical functions which are implemented conventionally (as software, hardware, etc.). Therefore, regular implementation-level attacks apply. In this paper, we list the challenges associated with the implementation of PQC, in particular vulnerabilities related to side-channel analyses. Some features in PQC, such as modular arithmetic in finite fields, inversions, non-uniform random numbers sampling, or decoding algorithms, are intrinsically hard to evaluate in constant-time. First, we detail the detection and the prevention of leakage arising from conditional control-flow and from conditional access to data structures. Second, we apply the same methodology to data leakage, in the situation where the manipulated data is randomly split in several shares (protection known as "masking"). Conventional detection of vertical leakage is not appropriate in the presence of countermeasures, such as masking. This paper shows that proper implementation of PQC requires knowledge of security evaluation and of secure coding. Owing to the large variety of PQC algorithms (key generation, encapsulation/decapsulation, signature verification/generation), classes (lattice-based, code-based, multivariate, etc.) and their configurations (key size, conforming to IND-CCA or IND-CPA security, etc.), generic methods shall be available. Those are overviewed in this paper, which is intended to provide to the readers with a comprehensive coverage about secure code evaluation and design. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
20957025
Volume :
10
Issue :
3
Database :
Complementary Index
Journal :
Journal of Cryptologic Research (2095-7025)
Publication Type :
Academic Journal
Accession number :
172300691
Full Text :
https://doi.org/10.13868/j.cnki.jcr.000624