Security Assessment of NTRU Against Non-Profiled SCA
نویسندگان
چکیده
NTRU was first introduced by J. Hoffstein, Pipher and J.H Silverman in 1998. Its security, efficiency compactness properties have been carefully studied for more than two decades. A key encapsulation mechanism (KEM) version even submitted to the NIST standardization competition made it final round. Even though has not chosen be a new standard, remains relevant, practical trustful post-quantum cryptographic primitive. In this paper, we investigate side-channel resistance of Decrypt procedure. contrast with previous works about analysis on NTRU, consider weak attacker model focus an implementation that incorporates some countermeasures. The is assumed unable mount powerful attacks using templates or forging malicious ciphertexts instance. context, show how non-profiled can done against core operation decryption. Despite considered countermeasures model, our experiments secret fully retrieved few tens traces.
منابع مشابه
Profiled SCA with a New Twist: Semi-supervised Learning
Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains access of a profiling device to build a precise model which is used to attack another device in the attacking phase. Mostly, it is assumed that the attacker has unlimited capabilities in the profiling phase, whereas the attacking phase is very restricted. We step away ...
متن کاملOn estimating the lattice security of NTRU
This report explicitly refutes the analysis behind a recent claim that NTRUEncrypt has a bit security of at most 74 bits. We also sum up some existing literature on NTRU and lattices, in order to help explain what should and what should not be classed as an improved attack against the hard problem underlying NTRUEncrypt. We also show a connection between Schnorr’s RSR technique and exhaustively...
متن کاملA Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of the polynomial mixing system with the independence of reduction modulo two relatively prime integers p and q. In this paper, we examine the effect of feeding special polynomials built from the public key to the decryp...
متن کاملSMS Security Using NTRU Cryptosystem for M-Commerce
Short Message Service (SMS) is getting more popular now-a-days. SMS was first used in December 1992, when Neil Papworth, a 22-year-old test engineer used a personal computer to send the text message "Merry Christmas" via the Vodafone GSM network to the phone of Richard Jarvis in the UK. It will play a very important role in the future business areas of mobile commerce (M-Commerce). Presently ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-25319-5_13