257 research outputs found
Post-quantum key exchange - a new hope
In 2015, Bos, Costello, Naehrig, and Stebila (IEEE Security & Privacy 2015)
proposed an instantiation of Ding\u27s ring-learning-with-errors (Ring-LWE) based
key-exchange protocol (also including the tweaks proposed by Peikert from
PQCrypto 2014), together with an implementation integrated into OpenSSL, with
the affirmed goal of providing post-quantum security for TLS.
In this work we revisit their instantiation and stand-alone implementation.
Specifically, we propose new parameters and a better suited error distribution,
analyze the scheme\u27s hardness against attacks by quantum computers in a
conservative way, introduce a new and more efficient error-reconciliation
mechanism, and propose a defense against backdoors and all-for-the-price-of-one
attacks. By these measures and for the same lattice dimension, we more than
double the security parameter, halve the communication overhead, and speed up
computation by more than a factor of 8 in a portable C implementation and by
more than a factor of 27 in an optimized implementation targeting current Intel
CPUs. These speedups are achieved with comprehensive protection against timing
attacks
Post-quantum cryptographic hardware primitives
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years. In this work, we introduce a set of hardware post-quantum cryptographic primitives (PCPs) consisting of four frequently used security components, i.e., public-key cryptosystem (PKC), key exchange (KEX), oblivious transfer (OT), and zero-knowledge proof (ZKP). In addition, we design a high speed polynomial multiplier to accelerate these primitives. These primitives will aid researchers and designers in constructing quantum-proof secure computing systems in the post-quantum era.Published versio
Post-Quantum Cryptographic Hardware Primitives
The development and implementation of post-quantum cryptosystems have become
a pressing issue in the design of secure computing systems, as general quantum
computers have become more feasible in the last two years. In this work, we
introduce a set of hardware post-quantum cryptographic primitives (PCPs)
consisting of four frequently used security components, i.e., public-key
cryptosystem (PKC), key exchange (KEX), oblivious transfer (OT), and
zero-knowledge proof (ZKP). In addition, we design a high speed polynomial
multiplier to accelerate these primitives. These primitives will aid
researchers and designers in constructing quantum-proof secure computing
systems in the post-quantum era.Comment: 2019 Boston Area Architecture Workshop (BARC'19
An Authenticated Key Agreement Scheme Based on Cyclic Automorphism Subgroups of Random Orders
Group-based cryptography is viewed as a modern cryptographic candidate solution to blocking quantum computer attacks, and key exchange protocols on the Internet are one of the primitives to ensure the security of communication. In 2016 Habeeb et al proposed a “textbook” key exchange protocol based on the semidirect product of two groups, which is insecure for use in real-world applications. In this paper, after discarding the unnecessary disguising notion of semidirect product in the protocol, we establish a simplified yet enhanced authenticated key agreement scheme based on cyclic automorphism subgroups of random orders by making hybrid use of certificates and symmetric-key encryption as challenge-and-responses in the public-key setting. Its passive security is formally analyzed, which is relative to the cryptographic hardness assumption of a computational number-theoretic problem. Cryptanalysis of this scheme shows that it is secure against the intruder-in-the-middle attack even in the worst case of compromising the signatures, and provides explicit key confirmation to both parties
Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory
The present survey reports on the state of the art of the different
cryptographic functionalities built upon the ring learning with errors problem
and its interplay with several classical problems in algebraic number theory.
The survey is based to a certain extent on an invited course given by the
author at the Basque Center for Applied Mathematics in September 2018.Comment: arXiv admin note: text overlap with arXiv:1508.01375 by other
authors/ comment of the author: quotation has been added to Theorem 5.
- …