A Template Attack on Binomial Sampling in NewHope

碩士 === 國立臺灣大學 === 電子工程學研究所 === 107 === The NewHope cryptosystem is a promising candidate for the future post-quantum cryptography standard. Besides its security against the attacks from quantum and classical computers, the side-channel security is also an important issue to the implementation of a c...

Full description

Bibliographic Details
Main Authors: CHUN-YU PENG, 彭俊又
Other Authors: 鄭振牟
Format: Others
Language:en_US
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/u353br
id ndltd-TW-107NTU05428055
record_format oai_dc
spelling ndltd-TW-107NTU054280552019-11-16T05:27:58Z http://ndltd.ncl.edu.tw/handle/u353br A Template Attack on Binomial Sampling in NewHope NewHope二項式抽樣模板攻擊 CHUN-YU PENG 彭俊又 碩士 國立臺灣大學 電子工程學研究所 107 The NewHope cryptosystem is a promising candidate for the future post-quantum cryptography standard. Besides its security against the attacks from quantum and classical computers, the side-channel security is also an important issue to the implementation of a cryptosystem. In this thesis, we first evaluate the potential side-channel vulnerabilities in the NewHope cryptosystem. Then, a template attack is presented, which can reveal the secret information generated by the Binomial Sampling Function and compromise the security of the cryptosystem. The result shows a 100% success rate of recovering the secrets by only using a single side-channel power consumption trace. 鄭振牟 2019 學位論文 ; thesis 39 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 電子工程學研究所 === 107 === The NewHope cryptosystem is a promising candidate for the future post-quantum cryptography standard. Besides its security against the attacks from quantum and classical computers, the side-channel security is also an important issue to the implementation of a cryptosystem. In this thesis, we first evaluate the potential side-channel vulnerabilities in the NewHope cryptosystem. Then, a template attack is presented, which can reveal the secret information generated by the Binomial Sampling Function and compromise the security of the cryptosystem. The result shows a 100% success rate of recovering the secrets by only using a single side-channel power consumption trace.
author2 鄭振牟
author_facet 鄭振牟
CHUN-YU PENG
彭俊又
author CHUN-YU PENG
彭俊又
spellingShingle CHUN-YU PENG
彭俊又
A Template Attack on Binomial Sampling in NewHope
author_sort CHUN-YU PENG
title A Template Attack on Binomial Sampling in NewHope
title_short A Template Attack on Binomial Sampling in NewHope
title_full A Template Attack on Binomial Sampling in NewHope
title_fullStr A Template Attack on Binomial Sampling in NewHope
title_full_unstemmed A Template Attack on Binomial Sampling in NewHope
title_sort template attack on binomial sampling in newhope
publishDate 2019
url http://ndltd.ncl.edu.tw/handle/u353br
work_keys_str_mv AT chunyupeng atemplateattackonbinomialsamplinginnewhope
AT péngjùnyòu atemplateattackonbinomialsamplinginnewhope
AT chunyupeng newhopeèrxiàngshìchōuyàngmóbǎngōngjī
AT péngjùnyòu newhopeèrxiàngshìchōuyàngmóbǎngōngjī
AT chunyupeng templateattackonbinomialsamplinginnewhope
AT péngjùnyòu templateattackonbinomialsamplinginnewhope
_version_ 1719292357739806720