Abstract
Post-quantum Cryptography (PQC) has reached the verge of standardization competition, with Kyber as a winning candidate. In this work, we demonstrate practical backdoor insertion in Kyber through kleptrography. The backdoor can be inserted using classical techniques like ECDH or post-quantum Classic Mceliece. The inserted backdoor targets the key generation procedure where generated output public keys subliminally leak information about the secret key to the owner of the backdoor. We demonstrate first practical instantiations of such attack at the protocol level by validating it on TLS 1.3.
Author supplied keywords
Cite
CITATION STYLE
Ravi, P., Bhasin, S., Chattopadhyay, A., Aikata, A., & Roy, S. S. (2024). Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs. In Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI (pp. 216–221). Association for Computing Machinery. https://doi.org/10.1145/3649476.3660373
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.