Sep 8, 2023 · Our research introduces two alternative masking methods to enhance the security of the compression function in Kyber through masking.
scholar.google.com › citations
We propose and evaluate two different masking countermeasures, based on additive and multiplicative masking. To the best of our knowledge, the multiplicative ...
People also ask
What are the countermeasures against side channel attacks?
What is the weakness of Kyber?
What are the techniques of side channel analysis?
What are the four types of side channel attacks?
Methods for Masking CRYSTALS-Kyber Against Side-Channel Attacks ; Date. 2023-12-11 ; Author. ÖZEREN, SILA Yayla, Oğuz ; Metadata. Show full item record.
Feb 28, 2023 · Change the mask values to be 2 (for 0) and 1 (for -1), subtracting -2 when used on the next line, less signal but still present. · Randomizing ...
Jul 2, 2024 · Based on the algorithm, we propose an optimized shuffling architecture and apply it to the open-source hard- ware implementation of Kyber from [ ...
Jan 4, 2024 · Deep learning-based side-channel analysis methods have already shown a protected CRYSTALS-Kyber hardware implementation to be vulnerable to ...
We will employ a technique called masking to fortify CRYSTALS-Kyber against side-channel attacks [41]. A common defense against power and electromagnetic side- ...
Nov 26, 2023 · We demonstrate a practical message (shared key) recovery attack on the first-order masked FPGA implementation of Kyber-512 by Kamucheka et al. (2022)
Aug 14, 2024 · In this paper, we primarily focus on two types of attack points: the encoding and decoding operations common in both unmasked and masked Kyber ...
Oct 26, 2024 · Masking obscures the underlying arithmetic behavior of cryptographic algorithms, offering additional protection against side-channel threats.