Please use this identifier to cite or link to this item:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/665
Title: | NewHope二項式抽樣模板攻擊 A Template Attack on Binomial Sampling in NewHope |
Authors: | CHUN-YU PENG 彭俊又 |
Advisor: | 鄭振牟 |
Keyword: | NewHope,後量子密碼學,旁通道分析,模板攻擊, NewHope,PQC,Side-Channel Analysis,Template Attack, |
Publication Year : | 2019 |
Degree: | 碩士 |
Abstract: | NewHope是一個被看好極有可能成為未來後量子密碼系統的演算法。在分析它抵禦量子電腦攻擊的安全性之餘,密碼系統實作的安全性也是一項重要的議題。本論文中,我們首先分析NewHope演算法中可能成為旁通道分析目標的模組。接著,我們針對其二項式抽樣的實作進行旁通道模板攻擊。實驗的結果顯示出攻擊者可以從單一次的功率消耗波形中,以100\%的成功率分析出二項式抽樣出的秘密參數。 The NewHope cryptosystem is a promising candidate for the future post-quantum cryptography standard. Besides its security against the attacks from quantum and classical computers, the side-channel security is also an important issue to the implementation of a cryptosystem. In this thesis, we first evaluate the potential side-channel vulnerabilities in the NewHope cryptosystem. Then, a template attack is presented, which can reveal the secret information generated by the Binomial Sampling Function and compromise the security of the cryptosystem. The result shows a 100% success rate of recovering the secrets by only using a single side-channel power consumption trace. |
URI: | http://tdr.lib.ntu.edu.tw/handle/123456789/665 |
DOI: | 10.6342/NTU201903050 |
Fulltext Rights: | 同意授權(全球公開) |
Appears in Collections: | 電子工程學研究所 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
ntu-108-1.pdf | 2.42 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.