Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = Supersingular Isogeny Key Encapsulation (SIKE) Mechanism

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 2848 KiB  
Article
Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism
by Ricardo Villanueva-Polanco and Eduardo Angulo-Madrid
Appl. Sci. 2021, 11(1), 193; https://doi.org/10.3390/app11010193 - 28 Dec 2020
Cited by 6 | Viewed by 2661
Abstract
This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National Institute of Standards and Technology [...] Read more.
This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography Standardization Process. To the best of our knowledge, this is the first time this scheme is assessed in the cold boot attacks setting. In particular, our evaluation is focused on the reference implementation of this scheme. Furthermore, we present a dedicated key-recovery algorithm for SIKE in this setting and show that the key recovery algorithm works for all the parameter sets recommended for this scheme. Moreover, we compute the success rates of our key recovery algorithm through simulations and show the key recovery algorithm may reconstruct the SIKE secret key for any SIKE parameters for a fixed and small α=0.001 (the probability of a 0 to 1 bit-flipping) and varying values for β (the probability of a 1 to 0 bit-flipping) in the set {0.001,0.01,,0.1}. Additionally, we show how to integrate a quantum key enumeration algorithm with our key-recovery algorithm to improve its overall performance. Full article
(This article belongs to the Special Issue Design and Security Analysis of Cryptosystems)
Show Figures

Figure 1

Back to TopTop