Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs

6Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Post-quantum Cryptography (PQC) has reached the verge of standardization competition, with Kyber as a winning candidate. In this work, we demonstrate practical backdoor insertion in Kyber through kleptrography. The backdoor can be inserted using classical techniques like ECDH or post-quantum Classic Mceliece. The inserted backdoor targets the key generation procedure where generated output public keys subliminally leak information about the secret key to the owner of the backdoor. We demonstrate first practical instantiations of such attack at the protocol level by validating it on TLS 1.3.

Cite

CITATION STYLE

APA

Ravi, P., Bhasin, S., Chattopadhyay, A., Aikata, A., & Roy, S. S. (2024). Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs. In Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI (pp. 216–221). Association for Computing Machinery. https://doi.org/10.1145/3649476.3660373

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free