A Template Attack on Binomial Sampling in NewHope
碩士 === 國立臺灣大學 === 電子工程學研究所 === 107 === The NewHope cryptosystem is a promising candidate for the future post-quantum cryptography standard. Besides its security against the attacks from quantum and classical computers, the side-channel security is also an important issue to the implementation of a c...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/u353br |
id |
ndltd-TW-107NTU05428055 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107NTU054280552019-11-16T05:27:58Z http://ndltd.ncl.edu.tw/handle/u353br A Template Attack on Binomial Sampling in NewHope NewHope二項式抽樣模板攻擊 CHUN-YU PENG 彭俊又 碩士 國立臺灣大學 電子工程學研究所 107 The NewHope cryptosystem is a promising candidate for the future post-quantum cryptography standard. Besides its security against the attacks from quantum and classical computers, the side-channel security is also an important issue to the implementation of a cryptosystem. In this thesis, we first evaluate the potential side-channel vulnerabilities in the NewHope cryptosystem. Then, a template attack is presented, which can reveal the secret information generated by the Binomial Sampling Function and compromise the security of the cryptosystem. The result shows a 100% success rate of recovering the secrets by only using a single side-channel power consumption trace. 鄭振牟 2019 學位論文 ; thesis 39 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 電子工程學研究所 === 107 === The NewHope cryptosystem is a promising candidate for the future post-quantum cryptography standard. Besides its security against the attacks from quantum and classical computers, the side-channel security is also an important issue to the implementation of a cryptosystem. In this thesis, we first evaluate the potential side-channel vulnerabilities in the NewHope cryptosystem. Then, a template attack is presented, which can reveal the secret information generated by the Binomial Sampling Function and compromise the security of the cryptosystem. The result shows a 100% success rate of recovering the secrets by only using a single side-channel power consumption trace.
|
author2 |
鄭振牟 |
author_facet |
鄭振牟 CHUN-YU PENG 彭俊又 |
author |
CHUN-YU PENG 彭俊又 |
spellingShingle |
CHUN-YU PENG 彭俊又 A Template Attack on Binomial Sampling in NewHope |
author_sort |
CHUN-YU PENG |
title |
A Template Attack on Binomial Sampling in NewHope |
title_short |
A Template Attack on Binomial Sampling in NewHope |
title_full |
A Template Attack on Binomial Sampling in NewHope |
title_fullStr |
A Template Attack on Binomial Sampling in NewHope |
title_full_unstemmed |
A Template Attack on Binomial Sampling in NewHope |
title_sort |
template attack on binomial sampling in newhope |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/u353br |
work_keys_str_mv |
AT chunyupeng atemplateattackonbinomialsamplinginnewhope AT péngjùnyòu atemplateattackonbinomialsamplinginnewhope AT chunyupeng newhopeèrxiàngshìchōuyàngmóbǎngōngjī AT péngjùnyòu newhopeèrxiàngshìchōuyàngmóbǎngōngjī AT chunyupeng templateattackonbinomialsamplinginnewhope AT péngjùnyòu templateattackonbinomialsamplinginnewhope |
_version_ |
1719292357739806720 |