Post-quantum cryptosystems are often designed starting from a public key encryption algorithm and augmented with widely recognized cryptographic constructions, which in turn are shared among the majority of proposals and create common targets for fault attacks, but also opportunities for overarching countermeasures. In this talk, we survey the fault resilience of these recurring structures in both Key Encapsulation Methods (KEMs) and signature schemes, taking as case studies both the current KEMs selected for the fourth round in the US NIST standardization process, and its on-ramp for post-quantum signatures.
Fault Attacks Friendliness of Post-quantum Cryptosystems
A. Barenghi;G. Pelosi
2023-01-01
Abstract
Post-quantum cryptosystems are often designed starting from a public key encryption algorithm and augmented with widely recognized cryptographic constructions, which in turn are shared among the majority of proposals and create common targets for fault attacks, but also opportunities for overarching countermeasures. In this talk, we survey the fault resilience of these recurring structures in both Key Encapsulation Methods (KEMs) and signature schemes, taking as case studies both the current KEMs selected for the fourth round in the US NIST standardization process, and its on-ramp for post-quantum signatures.File in questo prodotto:
File | Dimensione | Formato | |
---|---|---|---|
main.pdf
Accesso riservato
:
Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione
77.34 kB
Formato
Adobe PDF
|
77.34 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.