Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks ; Implantations d'algorithmes de cryptographie post-quantique sécurisées contre les attaques physiques
Uloženo v:
| Název: | Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks ; Implantations d'algorithmes de cryptographie post-quantique sécurisées contre les attaques physiques |
|---|---|
| Autoři: | Calle Viera, Andersson |
| Přispěvatelé: | ALgorithms for coMmunicAtion SecuriTY (ALMASTY), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Sorbonne Université, Damien Vergnaud, Alexandre Berzati |
| Zdroj: | https://theses.hal.science/tel-05131562 ; Cryptography and Security [cs.CR]. Sorbonne Université, 2025. English. ⟨NNT : 2025SORUS061⟩. |
| Informace o vydavateli: | CCSD |
| Rok vydání: | 2025 |
| Témata: | Post-Quantum Qryptography, Embedded Systems, Side Channel Attacks, Fault Attacks, Cryptographie post-quantique, Systèmes embarqués, Attaques par canaux auxiliaires, Attaques par fautes, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-ES]Computer Science [cs]/Embedded Systems |
| Popis: | This thesis investigates the challenges of implementing a secure, optimized version of the Dilithium signature scheme on embedded devices, focusing on side-channel and fault attacks. The research contributes to the broader field of post-quantum cryptography (PQC) by exploring practical vulnerabilities and countermeasures in real-world deployments. The first contribution involves optimizing Dilithium's signature algorithm. The study compares polynomial-based and vector-based implementations, demonstrating that a careful choice of data structures and computations can lead to significant memory savings without substantial performance overhead. This optimization is crucial for embedded devices, where memory is often the most constrained resource. The thesis also focuses on side-channel and fault attacks against Dilithium. Regarding side-channel attacks, the research identifies an intermediate value leakage exploitable through profiled attacks, allowing the robust recovery of the secret key with around 2 million signatures. Regarding fault attacks, the research identifies several locations relevant to fault attacks both in the signature algorithm, allowing the recovery of the secret key, and in the verification algorithms, allowing the acceptance of incorrect signatures. The research ultimately contributes to understanding how to balance security and efficiency in post-quantum cryptographic implementations. The thesis provides insights into deploying PQC schemes securely on embedded platforms by optimizing Dilithium's memory footprint and evaluating attack resilience. ; Cette thèse étudie les défis liés à la mise en œuvre d'une version sécurisée et optimisée du schéma de signature Dilithium sur des dispositifs embarqués, en se concentrant sur les attaques par canaux auxiliaires et les attaques par fautes. La thèse contribue au domaine plus large de la cryptographie post-quantique (PQC) en explorant les vulnérabilités pratiques et les contre-mesures dans les déploiements du monde réel. La première contribution ... |
| Druh dokumentu: | doctoral or postdoctoral thesis |
| Jazyk: | English |
| Relation: | NNT: 2025SORUS061 |
| Dostupnost: | https://theses.hal.science/tel-05131562 https://theses.hal.science/tel-05131562v1/document https://theses.hal.science/tel-05131562v1/file/147936_CALLE_VIERA_2025_archivage.pdf |
| Rights: | info:eu-repo/semantics/OpenAccess |
| Přístupové číslo: | edsbas.ADEB1953 |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://theses.hal.science/tel-05131562# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Viera%20C Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.ADEB1953 RelevancyScore: 931 AccessLevel: 3 PubType: Dissertation/ Thesis PubTypeId: dissertation PreciseRelevancyScore: 931.3056640625 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks ; Implantations d'algorithmes de cryptographie post-quantique sécurisées contre les attaques physiques – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Calle+Viera%2C+Andersson%22">Calle Viera, Andersson</searchLink> – Name: Author Label: Contributors Group: Au Data: ALgorithms for coMmunicAtion SecuriTY (ALMASTY)<br />LIP6<br />Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)<br />Sorbonne Université<br />Damien Vergnaud<br />Alexandre Berzati – Name: TitleSource Label: Source Group: Src Data: <i>https://theses.hal.science/tel-05131562 ; Cryptography and Security [cs.CR]. Sorbonne Université, 2025. English. ⟨NNT : 2025SORUS061⟩</i>. – Name: Publisher Label: Publisher Information Group: PubInfo Data: CCSD – Name: DatePubCY Label: Publication Year Group: Date Data: 2025 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Post-Quantum+Qryptography%22">Post-Quantum Qryptography</searchLink><br /><searchLink fieldCode="DE" term="%22Embedded+Systems%22">Embedded Systems</searchLink><br /><searchLink fieldCode="DE" term="%22Side+Channel+Attacks%22">Side Channel Attacks</searchLink><br /><searchLink fieldCode="DE" term="%22Fault+Attacks%22">Fault Attacks</searchLink><br /><searchLink fieldCode="DE" term="%22Cryptographie+post-quantique%22">Cryptographie post-quantique</searchLink><br /><searchLink fieldCode="DE" term="%22Systèmes+embarqués%22">Systèmes embarqués</searchLink><br /><searchLink fieldCode="DE" term="%22Attaques+par+canaux+auxiliaires%22">Attaques par canaux auxiliaires</searchLink><br /><searchLink fieldCode="DE" term="%22Attaques+par+fautes%22">Attaques par fautes</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-CR]Computer+Science+[cs]%2FCryptography+and+Security+[cs%2ECR]%22">[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-ES]Computer+Science+[cs]%2FEmbedded+Systems%22">[INFO.INFO-ES]Computer Science [cs]/Embedded Systems</searchLink> – Name: Abstract Label: Description Group: Ab Data: This thesis investigates the challenges of implementing a secure, optimized version of the Dilithium signature scheme on embedded devices, focusing on side-channel and fault attacks. The research contributes to the broader field of post-quantum cryptography (PQC) by exploring practical vulnerabilities and countermeasures in real-world deployments. The first contribution involves optimizing Dilithium's signature algorithm. The study compares polynomial-based and vector-based implementations, demonstrating that a careful choice of data structures and computations can lead to significant memory savings without substantial performance overhead. This optimization is crucial for embedded devices, where memory is often the most constrained resource. The thesis also focuses on side-channel and fault attacks against Dilithium. Regarding side-channel attacks, the research identifies an intermediate value leakage exploitable through profiled attacks, allowing the robust recovery of the secret key with around 2 million signatures. Regarding fault attacks, the research identifies several locations relevant to fault attacks both in the signature algorithm, allowing the recovery of the secret key, and in the verification algorithms, allowing the acceptance of incorrect signatures. The research ultimately contributes to understanding how to balance security and efficiency in post-quantum cryptographic implementations. The thesis provides insights into deploying PQC schemes securely on embedded platforms by optimizing Dilithium's memory footprint and evaluating attack resilience. ; Cette thèse étudie les défis liés à la mise en œuvre d'une version sécurisée et optimisée du schéma de signature Dilithium sur des dispositifs embarqués, en se concentrant sur les attaques par canaux auxiliaires et les attaques par fautes. La thèse contribue au domaine plus large de la cryptographie post-quantique (PQC) en explorant les vulnérabilités pratiques et les contre-mesures dans les déploiements du monde réel. La première contribution ... – Name: TypeDocument Label: Document Type Group: TypDoc Data: doctoral or postdoctoral thesis – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: NNT: 2025SORUS061 – Name: URL Label: Availability Group: URL Data: https://theses.hal.science/tel-05131562<br />https://theses.hal.science/tel-05131562v1/document<br />https://theses.hal.science/tel-05131562v1/file/147936_CALLE_VIERA_2025_archivage.pdf – Name: Copyright Label: Rights Group: Cpyrght Data: info:eu-repo/semantics/OpenAccess – Name: AN Label: Accession Number Group: ID Data: edsbas.ADEB1953 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.ADEB1953 |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: English Subjects: – SubjectFull: Post-Quantum Qryptography Type: general – SubjectFull: Embedded Systems Type: general – SubjectFull: Side Channel Attacks Type: general – SubjectFull: Fault Attacks Type: general – SubjectFull: Cryptographie post-quantique Type: general – SubjectFull: Systèmes embarqués Type: general – SubjectFull: Attaques par canaux auxiliaires Type: general – SubjectFull: Attaques par fautes Type: general – SubjectFull: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] Type: general – SubjectFull: [INFO.INFO-ES]Computer Science [cs]/Embedded Systems Type: general Titles: – TitleFull: Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks ; Implantations d'algorithmes de cryptographie post-quantique sécurisées contre les attaques physiques Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Calle Viera, Andersson – PersonEntity: Name: NameFull: ALgorithms for coMmunicAtion SecuriTY (ALMASTY) – PersonEntity: Name: NameFull: LIP6 – PersonEntity: Name: NameFull: Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS) – PersonEntity: Name: NameFull: Sorbonne Université – PersonEntity: Name: NameFull: Damien Vergnaud – PersonEntity: Name: NameFull: Alexandre Berzati IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2025 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: https://theses.hal.science/tel-05131562 ; Cryptography and Security [cs.CR]. Sorbonne Université, 2025. English. ⟨NNT : 2025SORUS061⟩ Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science