Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks ; Implantations d'algorithmes de cryptographie post-quantique sécurisées contre les attaques physiques

Uloženo v:
Podrobná bibliografie
Název: Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks ; Implantations d'algorithmes de cryptographie post-quantique sécurisées contre les attaques physiques
Autoři: Calle Viera, Andersson
Přispěvatelé: ALgorithms for coMmunicAtion SecuriTY (ALMASTY), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Sorbonne Université, Damien Vergnaud, Alexandre Berzati
Zdroj: https://theses.hal.science/tel-05131562 ; Cryptography and Security [cs.CR]. Sorbonne Université, 2025. English. ⟨NNT : 2025SORUS061⟩.
Informace o vydavateli: CCSD
Rok vydání: 2025
Témata: Post-Quantum Qryptography, Embedded Systems, Side Channel Attacks, Fault Attacks, Cryptographie post-quantique, Systèmes embarqués, Attaques par canaux auxiliaires, Attaques par fautes, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-ES]Computer Science [cs]/Embedded Systems
Popis: This thesis investigates the challenges of implementing a secure, optimized version of the Dilithium signature scheme on embedded devices, focusing on side-channel and fault attacks. The research contributes to the broader field of post-quantum cryptography (PQC) by exploring practical vulnerabilities and countermeasures in real-world deployments. The first contribution involves optimizing Dilithium's signature algorithm. The study compares polynomial-based and vector-based implementations, demonstrating that a careful choice of data structures and computations can lead to significant memory savings without substantial performance overhead. This optimization is crucial for embedded devices, where memory is often the most constrained resource. The thesis also focuses on side-channel and fault attacks against Dilithium. Regarding side-channel attacks, the research identifies an intermediate value leakage exploitable through profiled attacks, allowing the robust recovery of the secret key with around 2 million signatures. Regarding fault attacks, the research identifies several locations relevant to fault attacks both in the signature algorithm, allowing the recovery of the secret key, and in the verification algorithms, allowing the acceptance of incorrect signatures. The research ultimately contributes to understanding how to balance security and efficiency in post-quantum cryptographic implementations. The thesis provides insights into deploying PQC schemes securely on embedded platforms by optimizing Dilithium's memory footprint and evaluating attack resilience. ; Cette thèse étudie les défis liés à la mise en œuvre d'une version sécurisée et optimisée du schéma de signature Dilithium sur des dispositifs embarqués, en se concentrant sur les attaques par canaux auxiliaires et les attaques par fautes. La thèse contribue au domaine plus large de la cryptographie post-quantique (PQC) en explorant les vulnérabilités pratiques et les contre-mesures dans les déploiements du monde réel. La première contribution ...
Druh dokumentu: doctoral or postdoctoral thesis
Jazyk: English
Relation: NNT: 2025SORUS061
Dostupnost: https://theses.hal.science/tel-05131562
https://theses.hal.science/tel-05131562v1/document
https://theses.hal.science/tel-05131562v1/file/147936_CALLE_VIERA_2025_archivage.pdf
Rights: info:eu-repo/semantics/OpenAccess
Přístupové číslo: edsbas.ADEB1953
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://theses.hal.science/tel-05131562#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Viera%20C
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.ADEB1953
RelevancyScore: 931
AccessLevel: 3
PubType: Dissertation/ Thesis
PubTypeId: dissertation
PreciseRelevancyScore: 931.3056640625
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks ; Implantations d'algorithmes de cryptographie post-quantique sécurisées contre les attaques physiques
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Calle+Viera%2C+Andersson%22">Calle Viera, Andersson</searchLink>
– Name: Author
  Label: Contributors
  Group: Au
  Data: ALgorithms for coMmunicAtion SecuriTY (ALMASTY)<br />LIP6<br />Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)<br />Sorbonne Université<br />Damien Vergnaud<br />Alexandre Berzati
– Name: TitleSource
  Label: Source
  Group: Src
  Data: <i>https://theses.hal.science/tel-05131562 ; Cryptography and Security [cs.CR]. Sorbonne Université, 2025. English. ⟨NNT : 2025SORUS061⟩</i>.
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: CCSD
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2025
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Post-Quantum+Qryptography%22">Post-Quantum Qryptography</searchLink><br /><searchLink fieldCode="DE" term="%22Embedded+Systems%22">Embedded Systems</searchLink><br /><searchLink fieldCode="DE" term="%22Side+Channel+Attacks%22">Side Channel Attacks</searchLink><br /><searchLink fieldCode="DE" term="%22Fault+Attacks%22">Fault Attacks</searchLink><br /><searchLink fieldCode="DE" term="%22Cryptographie+post-quantique%22">Cryptographie post-quantique</searchLink><br /><searchLink fieldCode="DE" term="%22Systèmes+embarqués%22">Systèmes embarqués</searchLink><br /><searchLink fieldCode="DE" term="%22Attaques+par+canaux+auxiliaires%22">Attaques par canaux auxiliaires</searchLink><br /><searchLink fieldCode="DE" term="%22Attaques+par+fautes%22">Attaques par fautes</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-CR]Computer+Science+[cs]%2FCryptography+and+Security+[cs%2ECR]%22">[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-ES]Computer+Science+[cs]%2FEmbedded+Systems%22">[INFO.INFO-ES]Computer Science [cs]/Embedded Systems</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: This thesis investigates the challenges of implementing a secure, optimized version of the Dilithium signature scheme on embedded devices, focusing on side-channel and fault attacks. The research contributes to the broader field of post-quantum cryptography (PQC) by exploring practical vulnerabilities and countermeasures in real-world deployments. The first contribution involves optimizing Dilithium's signature algorithm. The study compares polynomial-based and vector-based implementations, demonstrating that a careful choice of data structures and computations can lead to significant memory savings without substantial performance overhead. This optimization is crucial for embedded devices, where memory is often the most constrained resource. The thesis also focuses on side-channel and fault attacks against Dilithium. Regarding side-channel attacks, the research identifies an intermediate value leakage exploitable through profiled attacks, allowing the robust recovery of the secret key with around 2 million signatures. Regarding fault attacks, the research identifies several locations relevant to fault attacks both in the signature algorithm, allowing the recovery of the secret key, and in the verification algorithms, allowing the acceptance of incorrect signatures. The research ultimately contributes to understanding how to balance security and efficiency in post-quantum cryptographic implementations. The thesis provides insights into deploying PQC schemes securely on embedded platforms by optimizing Dilithium's memory footprint and evaluating attack resilience. ; Cette thèse étudie les défis liés à la mise en œuvre d'une version sécurisée et optimisée du schéma de signature Dilithium sur des dispositifs embarqués, en se concentrant sur les attaques par canaux auxiliaires et les attaques par fautes. La thèse contribue au domaine plus large de la cryptographie post-quantique (PQC) en explorant les vulnérabilités pratiques et les contre-mesures dans les déploiements du monde réel. La première contribution ...
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: doctoral or postdoctoral thesis
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: NNT: 2025SORUS061
– Name: URL
  Label: Availability
  Group: URL
  Data: https://theses.hal.science/tel-05131562<br />https://theses.hal.science/tel-05131562v1/document<br />https://theses.hal.science/tel-05131562v1/file/147936_CALLE_VIERA_2025_archivage.pdf
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: info:eu-repo/semantics/OpenAccess
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.ADEB1953
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.ADEB1953
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Post-Quantum Qryptography
        Type: general
      – SubjectFull: Embedded Systems
        Type: general
      – SubjectFull: Side Channel Attacks
        Type: general
      – SubjectFull: Fault Attacks
        Type: general
      – SubjectFull: Cryptographie post-quantique
        Type: general
      – SubjectFull: Systèmes embarqués
        Type: general
      – SubjectFull: Attaques par canaux auxiliaires
        Type: general
      – SubjectFull: Attaques par fautes
        Type: general
      – SubjectFull: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
        Type: general
      – SubjectFull: [INFO.INFO-ES]Computer Science [cs]/Embedded Systems
        Type: general
    Titles:
      – TitleFull: Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks ; Implantations d'algorithmes de cryptographie post-quantique sécurisées contre les attaques physiques
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Calle Viera, Andersson
      – PersonEntity:
          Name:
            NameFull: ALgorithms for coMmunicAtion SecuriTY (ALMASTY)
      – PersonEntity:
          Name:
            NameFull: LIP6
      – PersonEntity:
          Name:
            NameFull: Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)
      – PersonEntity:
          Name:
            NameFull: Sorbonne Université
      – PersonEntity:
          Name:
            NameFull: Damien Vergnaud
      – PersonEntity:
          Name:
            NameFull: Alexandre Berzati
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2025
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: https://theses.hal.science/tel-05131562 ; Cryptography and Security [cs.CR]. Sorbonne Université, 2025. English. ⟨NNT : 2025SORUS061⟩
              Type: main
ResultId 1