2020
DOI: 10.3390/app11010193
|View full text |Cite
|
Sign up to set email alerts
|

Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism

Abstract: This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography Standardization Process. To the best of our knowledge, this is the first time this scheme is assessed in the cold boot attacks setting. In particular, our evaluation is focused on the refere… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…This problem has been addressed previously in the side-channel analysis literature, with a variety of different algorithms able to solve this problem and the related problem known as the key-rank estimation [43][44][45][46][47][48][49][50][51][52][53][54][55][56][57]. We remark that each method of enumerating the full key candidates defines a new variant of the key-enumeration problem [42] and that these variants arise in many cryptographic contexts [58][59][60][61][62][63].…”
Section: Key Enumeration and Key Rank Estimation Problemmentioning
confidence: 99%
“…This problem has been addressed previously in the side-channel analysis literature, with a variety of different algorithms able to solve this problem and the related problem known as the key-rank estimation [43][44][45][46][47][48][49][50][51][52][53][54][55][56][57]. We remark that each method of enumerating the full key candidates defines a new variant of the key-enumeration problem [42] and that these variants arise in many cryptographic contexts [58][59][60][61][62][63].…”
Section: Key Enumeration and Key Rank Estimation Problemmentioning
confidence: 99%
“…Additionally, these ideas are applied to tackle the key-recovery problem for toy parameters of Rainbow and McEliece Public-Key Encryption [44]. Another recent paper [47] extends these ideas to successfully key-recovery Supersingular Isogeny Key Encapsulation (SIKE) Mechanism private keys. Furthermore, Albrecht et al [4] explore cold boot attacks on post-quantum cryptographic schemes based on the ring-and module-variants of the Learning with Errors (LWE) problem.…”
Section: Post-quantum Settingmentioning
confidence: 99%
“…Throughout this section, we present a key-recovery method that combines key enumeration algorithms and Grover's algorithm. The first version of this set of algorithms is introduced in [33] in the context of side-channel attacks and recently has been adjusted to be used in the cold boot attack setting on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism [47].…”
Section: Our Key-recovery Algorithmmentioning
confidence: 99%
“…A study by Villanueva-Polanco and Angulo-Madrid pointed out that a cold start is when a new entity that has never been evaluated is added to the system and its associated data is extremely scarce. In addition, when a newly registered user joins the system, the user's data is extremely lacking, and it is also impossible to recommend [6]. Karacan et al proposed and applied a novel overlapping method that employs overlapping techniques as a tool to deal with the shortcomings of clustering techniques.…”
Section: Introductionmentioning
confidence: 99%