Powered by OpenAIRE graph
Found an issue? Give us feedback
OpenMETUarrow_drop_down
OpenMETU
Master thesis . 2023
License: CC BY NC ND
Data sources: OpenMETU
addClaim

A STUDY ON CRYSTALS-KYBER AND ITS MASKED IMPLEMENTATIONS

CRYSTALS-KYBER VE MASKELENMİŞ UYGULAMALARI ÜZERİNE BİR ÇALIŞMA.
Authors: Özeren, Sıla;

A STUDY ON CRYSTALS-KYBER AND ITS MASKED IMPLEMENTATIONS

Abstract

As we transition into the quantum computing era, the security of widely-used cryptographic algorithms is facing significant challenges. This is attributable to Shor's algorithm, enabling quantum computers to break conventional cryptosystems such as RSA, DSA, and elliptic curve cryptosystems. This thesis provides a comprehensive study on the CRYSTALS-Kyber key encapsulation mechanism (KEM), the only KEM algorithm that was a third-round finalist in NIST's PQC Standardization effort. We begin with a detailed examination of the foundational concepts of lattices, introducing the inherent hard problems in lattice cryptography, including Learning with Errors (LWE), Ring-LWE, and Module-LWE. We subsequently delve into the three components of Kyber.CPAPKE and detail the Fujisaki-Okamoto transform version of each algorithm necessary to achieve IND-CCA2 security. An extensive study is conducted on existing masking methods for the compression function in Kyber, and their shortcomings due to prime modulo design are highlighted. We propose two methods for masking this compression function: one integrating a look-up-table, and the other utilizing a double-and-check method. Additionally, we introduce potential compression functions for various prime numbers.

Kuantum hesaplama çağına geçiş yaparken, RSA, DSA ve eliptik eğri kriptosistemleri gibi birçok yaygın kullanılan kriptografik algoritmanın güvenliği önemli zorluklarla karşı karşıya kalıyor. Bu tezde, NIST'in kuantum-sonrası kriptografi standardizasyon sürecinin finalistlerinden biri olan CRYSTALS-Kyber anahtar kapsülleme mekanizması üzerine kapsamlı bir inceleme sunmaktayız. Kafes-tabanlı kriptografinin temel kavramlarının detaylı bir açıklamasıyla başlayarak, bu alanda bilinen zor problemleri tanıtıyoruz. Daha sonra, Kyber.CPAPKE'nin üç bileşenini detaylıca inceliyoruz ve her bir algoritmanın IND-CCA2 güvenliği için gerekli olan Fujisaki-Okamoto dönüşüm versiyonlarını sunuyoruz. Kyber'deki kompresyon fonksiyonu için mevcut maskeleme yöntemleri üzerine detaylı bir çalışma yürütüyoruz ve bunların asal modül tasarımı nedeniyle birtakım niteliklerden yoksun olduğunu belirtiyoruz. Bu kompresyon fonksiyonunu maskelemek için iki yöntem öneriyoruz. Biri bir arama tablosunu entegre ederken, diğeri bir çiftle-ve-kontrol et yöntemini kullanıyor. Ek olarak, çeşitli asal sayılar için potansiyel kompresyon fonksiyonlarını sunuyoruz.

Country
Turkey
Related Organizations
Keywords

post-quantum cryptography, lattice cryptography, CRYSTALS-KYBER, key encapsulation mechanism, side-channel attacks, masking countermeasures

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!