A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

A side-channel attack on a bitsliced higher-order masked CRYSTALS-Kyber implementation

R Wang, M Brisfors, E Dubrova - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In response to side-channel attacks on masked implementations of post-quantum
cryptographic algorithms, a new bitsliced higher-order masked implementation of …

Cache-timing attack against HQC

S Huang, RQ Sim, C Chuengsatiansup… - Cryptology ePrint …, 2023 - eprint.iacr.org
In this paper, we present the first chosen-ciphertext (CC) cache-timing attacks on the
reference implementation of HQC. We build a cache-timing based distinguisher for …

Towards automated detection of single-trace side-channel vulnerabilities in constant-time cryptographic code

F Erata, R Piskac, V Mateu… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Although cryptographic algorithms may be mathematically secure, it is often possible to leak
secret information from the implementation of the algorithms. Timing and power side …

A single-trace message recovery attack on a masked and shuffled implementation of CRYSTALS-Kyber

S Jendral, K Ngo, R Wang, E Dubrova - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Last year CRYSTALS-Kyber was chosen by NIST as a new, post-quantum secure key
encapsulation mechanism to be standardized. This makes it important to assess the …

Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation

M Iavich, T Kuchukhidze - Cryptography, 2024 - mdpi.com
Significant advancements have been achieved in the field of quantum computing in recent
years. If somebody ever creates a sufficiently strong quantum computer, many of the public …

Divide and surrender: Exploiting variable division instruction timing in hqc key recovery attacks

RL Schröder, S Gast, Q Guo - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We uncover a critical side-channel vulnerability in the Hamming Quasi-Cyclic (HQC) round 4
optimized implementation arising due to the use of the modulo operator. In some cases …

A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation

R Wang, M Brisfors, E Dubrova - International Conference on Applied …, 2024 - Springer
In response to side-channel attacks on masked implementations of post-quantum
cryptographic algorithms, a new bitsliced higher-order masked implementation of …

Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information

M Brinkmann, C Chuengsatiansup, A May… - Cryptology ePrint …, 2023 - eprint.iacr.org
The McEliece cryptosystem is a strong contender for post-quantum schemes, including key
encapsulation for confidentiality of key exchanges in network protocols. A McEliece secret …

[PDF][PDF] Analyzing CRYSTALS-Kyber's Susceptibility to Side Channel Attacks: An Empirical Exploration

KS Roy, SD SL, TK Mishra, M Hassan, RA Hazarika - 2024 - scholar.archive.org
In this research, side-channel analysis attacks against the Krystal Kyber cryptographic
scheme are empirically studied. This study explores how vulnerable Krystal Kyber is to these …