Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM
Continuous Key Agreement (CKA) is a two-party protocol used in double-ratchet protocols such as signal. It enables continuous and synchronous key distribution that generates a fresh key to encrypt each transaction in messenger apps. It guarantees forward
Joohee Lee, Jihoon Kwon, Ji Sun Shin
doaj +1 more source
Secure post‐quantum group key exchange: Implementing a solution based on Kyber
In this article, the authors report on the implementation of a post‐quantum group key exchange protocol, which is proven secure in the so‐called Quantum Random Oracle Model. It is based on a two‐party design called Kyber, which is a finalist in the NIST standardization contest for post‐quantum cryptographic designs.
José Ignacio Escribano Pablos +1 more
wiley +1 more source
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention.
Melissa Azouaoui +3 more
doaj +3 more sources
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM [PDF]
Rapid advances in quantum computing, together with the announcement by the National Institute of Standards and Technology (NIST) to define new standards for digitalsignature, encryption, and key-establishment protocols, have created significant interest in post-quantum cryptographic schemes. This paper introduces Kyber (part of CRYSTALS – Cryptographic
Bos, Joppe +8 more
openaire +2 more sources
Lattice‐based cryptosystems in standardisation processes: A survey
Abstract The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives. Due to solid security and desirable performance, lattice‐based cryptosystems are viewed as promising candidates in the upcoming ...
Anyu Wang, Dianyan Xiao, Yang Yu
wiley +1 more source
Efficient, Error-Resistant NTT Architectures for CRYSTALS-Kyber FPGA Accelerators
The dawn of cost-effective miniaturised satellites is currently attracting venture capital in a never seen before ratio to launch mega-constellations of satellites for a diverse range of applications. These satellites are vulnerable to attacks by high-capability cyber-criminals (including quantum enabled adversaries), due to the critical data they ...
Khan, Safiullah +6 more
openaire +4 more sources
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
The module learning with errors (MLWE) problem has attracted considerable attention for its tradeoff between security and efficiency. The quantum/classical worst‐case to average‐case hardness for the MLWE problem (or more exactly, a family of problems) has been established, but most of the known results require the seed distribution to be the uniform ...
Wenjuan Jia, Baocang Wang, Youwen Zhu
wiley +1 more source
Hardness of Module‐LWE with Semiuniform Seeds from Module‐NTRU
The module learning with errors (MLWE) problem has attracted significant attention and has been widely used in building a multitude of lattice‐based cryptographic primitives. The hardness of the MLWE problem has been established for several variants, but most of the known results require the seed distribution (i.e., the distribution of matrix A) to be ...
Wenjuan Jia +3 more
wiley +1 more source
HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining
CRYSTALS-Kyber (Kyber) was recently chosen as the first quantum resistant Key Encapsulation Mechanism (KEM) scheme for standardisation, after three rounds of the National Institute of Standards and Technology (NIST) initiated PQC competition which begin in 2016 and search of the best quantum resistant KEMs and digital signatures.
Ziying Ni +4 more
openaire +3 more sources
Kyber, Saber, and SK‐MLWR Lattice‐Based Key Encapsulation Mechanisms Model Checking with Maude
Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public‐key post‐quantum cryptographic primitives that are resistant to the quantum attackers. Among them, there is a large number of post‐quantum key encapsulation mechanisms (KEMs), whose purpose is to provide
Duong Dinh Tran +5 more
wiley +1 more source

