Security Assessment of NTRU Against Non-Profiled SCA

نویسندگان

چکیده

NTRU was first introduced by J. Hoffstein, Pipher and J.H Silverman in 1998. Its security, efficiency compactness properties have been carefully studied for more than two decades. A key encapsulation mechanism (KEM) version even submitted to the NIST standardization competition made it final round. Even though has not chosen be a new standard, remains relevant, practical trustful post-quantum cryptographic primitive. In this paper, we investigate side-channel resistance of Decrypt procedure. contrast with previous works about analysis on NTRU, consider weak attacker model focus an implementation that incorporates some countermeasures. The is assumed unable mount powerful attacks using templates or forging malicious ciphertexts instance. context, show how non-profiled can done against core operation decryption. Despite considered countermeasures model, our experiments secret fully retrieved few tens traces.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Profiled SCA with a New Twist: Semi-supervised Learning

Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains access of a profiling device to build a precise model which is used to attack another device in the attacking phase. Mostly, it is assumed that the attacker has unlimited capabilities in the profiling phase, whereas the attacking phase is very restricted. We step away ...

متن کامل

On estimating the lattice security of NTRU

This report explicitly refutes the analysis behind a recent claim that NTRUEncrypt has a bit security of at most 74 bits. We also sum up some existing literature on NTRU and lattices, in order to help explain what should and what should not be classed as an improved attack against the hard problem underlying NTRUEncrypt. We also show a connection between Schnorr’s RSR technique and exhaustively...

متن کامل

A Chosen-Ciphertext Attack against NTRU

We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of the polynomial mixing system with the independence of reduction modulo two relatively prime integers p and q. In this paper, we examine the effect of feeding special polynomials built from the public key to the decryp...

متن کامل

SMS Security Using NTRU Cryptosystem for M-Commerce

Short Message Service (SMS) is getting more popular now-a-days. SMS was first used in December 1992, when Neil Papworth, a 22-year-old test engineer used a personal computer to send the text message "Merry Christmas" via the Vodafone GSM network to the phone of Richard Jarvis in the UK. It will play a very important role in the future business areas of mobile commerce (M-Commerce). Presently ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-25319-5_13