CryptoDB
Attacks on NIST PQC 3rd Round Candidates
Authors: | |
---|---|
Download: | |
Presentation: | Slides |
Abstract: | With the beginning of the third round of NIST's Post-Quantum Cryptography standardization project recently announced, one of the major contributing factors for selection will be side-channel analysis and attacks in general. NIST state, in their most recent (NISTIR 8309) Status Report document that ``NIST hopes to see more and better data for performance in the third round. This performance data will hopefully include implementations that protect against side-channel attacks, such as timing attacks, power monitoring attacks, fault attacks, etc''. This clearly requires actually performing these attacks on reference, optimizied, and even side-channel resistant implementations of the candidates. Moreover, it is also prudent to know which attacks have and have not been done. We fill this gap by presenting a comprehensive overview and survey of the state-of-the-art on attacks for these post-quantum schemes, which range from classical cryptanalysis, static timing analysis, fault attacks, simple power analysis, correlation and differential power analysis, electromagnetic attacks, template attacks, cold-boot attacks, and then also highlight countermeasures. The talk will contribute a full list of all attacks found to-date but will primarily (for brevity) discuss a selection of the more interest and/or important attacks found. |
Video: | https://youtu.be/X0Y6D5zLI-Y?t=1760 |
BibTeX
@misc{rwc-2021-35530, title={Attacks on NIST PQC 3rd Round Candidates}, note={Video at \url{https://youtu.be/X0Y6D5zLI-Y?t=1760}}, howpublished={Talk given at RWC 2021}, author={Daniel Apon and James Howe}, year=2021 }