首页 | 本学科首页   官方微博 | 高级检索  
     

后量子密码算法的侧信道攻击与防御综述
引用本文:吴伟彬,刘哲,杨昊,张吉鹏.后量子密码算法的侧信道攻击与防御综述[J].软件学报,2021,32(4):1165-1185.
作者姓名:吴伟彬  刘哲  杨昊  张吉鹏
作者单位:南京航空航天大学计算机科学与技术学院,江苏南京211106
基金项目:国家自然科学基金项目(61802180);江苏省自然科学基金(.BK20180421);国家密码发展基金(MMJJ20180105);中央高校基础研究基金(NE2018106)
摘    要:为了解决量子计算对公钥密码安全的威胁,后量子密码成为密码领域的前沿焦点研究问题.后量子密码通过数学理论保证了算法的安全性,但在具体实现和应用中易受侧信道攻击,这严重威胁到后量子密码的安全性.基于美国NIST第2轮候选算法和中国CACR公钥密码竞赛第2轮的候选算法,针对基于格、基于编码、基于哈希、基于多变量等多种后量子密...

关 键 词:后量子密码  侧信道攻击  故障攻击  能量分析攻击  时间攻击
收稿时间:2020/5/23 0:00:00
修稿时间:2020/8/14 0:00:00

Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography
WU Wei-Bin,LIU Zhe,YANG Hao,ZHANG Ji-Peng.Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography[J].Journal of Software,2021,32(4):1165-1185.
Authors:WU Wei-Bin  LIU Zhe  YANG Hao  ZHANG Ji-Peng
Affiliation:College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
Abstract:To solve the threat of quantum computing to the security of public-key cryptography, post-quantum cryptography has become a frontier focus in the field of cryptography. Post-quantum cryptography guarantees the security of the algorithm through mathematical theories, but it is vulnerable to side-channel attacks in specific implementation and applications, which will seriously threaten the security of post-quantum cryptography. This paper is based on the round 2 candidates in the NIST post-quantum cryptography standardization process and the round 2 candidates in the CACR public key cryptography competition in China. We first conduct classification investigations of various post-quantum cryptographic algorithms, including lattice-based, code-based, hash-based, and multivariate-based cryptographic algorithms. We then analyze their security status against side-channel attacks and existing protection strategies. To analyze the methods of side-channel attack against post-quantum cryptography, we summarize the commonly used post-quantum cryptography side-channel attack methods, attack targets, and attack evaluation indexes for various post-quantum cryptography according to the classification of core operators and attack types. Furthermore, following the attack types and attack targets, we sorted out the existing countermeasures for attack and the costs of defense strategies. Finally, in the conclusion part, we put forward some security suggestions according to the attack method, protection means, and protection cost, and also analyze the potential side-channel attack methods and defense strategies in the future.
Keywords:Post-Quantum Cryptography  Side-Channel Attacks  Fault Attack  Power Analysis  Timing Attack
本文献已被 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号