Secure lightweight post quantum cryptography on modern embedded processors
Lead Research Organisation:
Queen's University of Belfast
Department Name: Sch of Electronics, Elec Eng & Comp Sci
Abstract
"The focus of this research is to investigate practical masking techniques for post-quantum cryptographic algorithms, specifically those recently standardized in FIPS 203, 204, and 205 by NIST in August 2024. These algorithms, designed to protect against both classical and quantum attacks, mark a critical step forward in safeguarding future data. However, they remain vulnerable to side-channel attacks, where adversaries exploit information leaked during the computation of cryptographic operations. As it is impractical to attack many modern cryptographic schemes Algorithmically, these side-channels are particularly attractive avenues for advanced adversaries.
Current masking techniques are often prohibitively expensive in terms of time and resources, limiting their practicality. This project aims to explore novel and lightweight approaches to masking that can mitigate these side-channel risks more efficiently. Masking is essential because cryptographic systems, though theoretically secure, are inherently deterministic and all electronic devices are prone to leaking information through patterns like power consumption or electromagnetic emissions. Such leakages combined with determinism means that the captured output can be exploited using statistical methods or AI, allowing adversaries to deduce sensitive information like encryption keys."
Current masking techniques are often prohibitively expensive in terms of time and resources, limiting their practicality. This project aims to explore novel and lightweight approaches to masking that can mitigate these side-channel risks more efficiently. Masking is essential because cryptographic systems, though theoretically secure, are inherently deterministic and all electronic devices are prone to leaking information through patterns like power consumption or electromagnetic emissions. Such leakages combined with determinism means that the captured output can be exploited using statistical methods or AI, allowing adversaries to deduce sensitive information like encryption keys."
People |
ORCID iD |
Ayesha Khalid (Primary Supervisor) | |
Adam Beattie (Student) |
Studentship Projects
Project Reference | Relationship | Related To | Start | End | Student Name |
---|---|---|---|---|---|
EP/W524657/1 | 30/09/2022 | 29/09/2028 | |||
2931060 | Studentship | EP/W524657/1 | 30/09/2024 | 30/03/2028 | Adam Beattie |