Sökning: "Kyber"

Hittade 3 uppsatser innehållade ordet Kyber.

  1. 1. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Linus Backlund; [2023]
    Nyckelord :Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Sammanfattning : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. LÄS MER

  2. 2. Experimental Evaluation of Kleptographic Backdoors in LWE-based KEMs

    Master-uppsats, Linköpings universitet/Institutionen för systemteknik

    Författare :Miriam Rosén; [2023]
    Nyckelord :cryptography; post-quantum; backdoor; kleptography;

    Sammanfattning : This work aims to provide an experimental evaluation of two kleptographic backdoors. The backdoors target the key generation step in Learning with Errors-based crypto algorithms and exploit freedom in choosing the seeds for the algorithm. LÄS MER

  3. 3. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

    Master-uppsats, Linköpings universitet/Informationskodning

    Författare :Hampus Eriksson; [2020]
    Nyckelord :post-quantum; cryptography; lattice-based cryptography; quantum-resistant; Kyber; constrained device; performance; evaluation; implementation;

    Sammanfattning : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. LÄS MER