Sökning: "Post-quantum secure cryptography"

Visar resultat 1 - 5 av 7 uppsatser innehållade orden Post-quantum secure cryptography.

  1. 1. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Linus Backlund; [2023]
    Nyckelord :Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Sammanfattning : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. LÄS MER

  2. 2. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Alex Gustafsson; Carl Stensson; [2021]
    Nyckelord :Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Sammanfattning : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. LÄS MER

  3. 3. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

    Master-uppsats, Linköpings universitet/Informationskodning

    Författare :Hampus Eriksson; [2020]
    Nyckelord :post-quantum; cryptography; lattice-based cryptography; quantum-resistant; Kyber; constrained device; performance; evaluation; implementation;

    Sammanfattning : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. LÄS MER

  4. 4. A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol

    Master-uppsats, Linköpings universitet/Informationskodning

    Författare :Markus Alvila; [2019]
    Nyckelord :post-quantum; resistant; cryptography; commutative; supersingular; isogeny; Diffie-Hellman; CSIDH; Signal; protocol; X3DH; Double Ratchet; Curve25519; performance; evaluation; CPU; profiling; Android;

    Sammanfattning : The Signal protocol can be considered state-of-the-art when it comes to secure messaging, but advances in quantum computing stress the importance of finding post-quantum resistant alternatives to its asymmetric cryptographic primitives. The aim is to determine whether existing post-quantum cryptography can be used as a drop-in replacement for the public-key cryptography currently used in the Signal protocol and what the performance trade-offs may be. LÄS MER

  5. 5. Performance analysis of lattice based post-quantum secure cryptography with Java

    Uppsats för yrkesexamina på avancerad nivå, Umeå universitet/Institutionen för fysik

    Författare :Alexander Johansson; [2019]
    Nyckelord :Cryptography; Post-quantum secure cryptography; Lattice-based cryptography; Learning with errors; Java;

    Sammanfattning : Efficient quantum computers will break most of today’s public-key cryptosystems. Therefore, the National Institute of Standards and Technology (NIST) calls for proposals to standardise one or more quantum-secure cryptographic schemes. LÄS MER