Avancerad sökning

Visar resultat 1 - 5 av 7 uppsatser som matchar ovanstående sökkriterier.

  1. 1. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Linus Backlund; [2023]
    Nyckelord :Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Sammanfattning : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. LÄS MER

  2. 2. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

    Master-uppsats, Linköpings universitet/Informationskodning

    Författare :Hampus Eriksson; [2020]
    Nyckelord :post-quantum; cryptography; lattice-based cryptography; quantum-resistant; Kyber; constrained device; performance; evaluation; implementation;

    Sammanfattning : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. LÄS MER

  3. 3. Post-Quantum Public Key Cryptography for the Internet of Things

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Olof Magnusson; Mats Hurtig; [2019]
    Nyckelord :Cryptography; Post-quantum lightweight encryption; NTRUEncrypt; WolfSSL; Transport layer security; Application domain; Quantum computers;

    Sammanfattning : Recent progress in the field of quantum computers provide radically improved muscles to search and sort in lists, solve systems of equations and prime factorize – virtues that inflict an immediate threat to the most common systems for public key cryptography used in a vast proportion of today’s computer networks. NTRUEncrypt is a lattice-based cryptography system which inhibits quantum computers for breaking the algorithm in polynomial time. LÄS MER

  4. 4. Performance analysis of lattice based post-quantum secure cryptography with Java

    Uppsats för yrkesexamina på avancerad nivå, Umeå universitet/Institutionen för fysik

    Författare :Alexander Johansson; [2019]
    Nyckelord :Cryptography; Post-quantum secure cryptography; Lattice-based cryptography; Learning with errors; Java;

    Sammanfattning : Efficient quantum computers will break most of today’s public-key cryptosystems. Therefore, the National Institute of Standards and Technology (NIST) calls for proposals to standardise one or more quantum-secure cryptographic schemes. LÄS MER

  5. 5. Analysis of Lattice Reduction Algorithms : Solving SVP Challenges

    Master-uppsats, Linnéuniversitetet/Institutionen för matematik (MA)

    Författare :Hailay Gidey Weldu; [2018]
    Nyckelord :;

    Sammanfattning : Lattice-based cryptography which holds a great promise for post-quantum cryptographyis naturally concerned by lattice reduction algorithms, the essential tools in the algorithmicstudy of lattices and its applications. In order to precisely estimate the securityparameters of these cryptosystems, it is a necessity to assess the practical diculty of theshortest vector problem (SVP) by analyzing the known ecient algorithms for solvingit. LÄS MER