Algorithms for Reconstructing Databases and Cryptographic Secret Keys in Entropic Settings
dc.contributor.advisor | Dachman-Soled, Dana | en_US |
dc.contributor.author | Shahverdi, Aria | en_US |
dc.contributor.department | Electrical Engineering | en_US |
dc.contributor.publisher | Digital Repository at the University of Maryland | en_US |
dc.contributor.publisher | University of Maryland (College Park, Md.) | en_US |
dc.date.accessioned | 2022-06-15T05:38:38Z | |
dc.date.available | 2022-06-15T05:38:38Z | |
dc.date.issued | 2022 | en_US |
dc.description.abstract | A small amount of information leakage can undermine the security of a design that is otherwise considered secure. Many studies demonstrate how common leakages such as power consumption, electromagnetic emission, and the time required to perform certain operations can reveal information, such as the secret key of a cryptosystem. As a first contribution, in this work, we explore the possibility of cache attacks, a type of timing side-channel attack, in a new setting, namely, data processing. Later we show an improved attack on Learning Parity with Noise problems with a sparse secret. We propose two algorithms that are asymptotically faster than state-of-the-art. Finally, we show that the structure presented in RLWE constructions, in contrast to LWE constructions, opens up new attacks. Constructions based on LWE can be proven secure as long as the secret retains enough entropy. We show, however, that constructions based on RLWE can be completely broken even if the secret key retains 3/4 of its entropy. | en_US |
dc.identifier | https://doi.org/10.13016/kois-w9lz | |
dc.identifier.uri | http://hdl.handle.net/1903/28740 | |
dc.language.iso | en | en_US |
dc.subject.pqcontrolled | Computer engineering | en_US |
dc.subject.pquncontrolled | Cache-Attack | en_US |
dc.subject.pquncontrolled | Lattice-based Cryptography | en_US |
dc.subject.pquncontrolled | Leakage Resilience | en_US |
dc.subject.pquncontrolled | Partial Key Exposure | en_US |
dc.subject.pquncontrolled | Post-quantum Cryptography | en_US |
dc.title | Algorithms for Reconstructing Databases and Cryptographic Secret Keys in Entropic Settings | en_US |
dc.type | Dissertation | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Shahverdi_umd_0117E_22358.pdf
- Size:
- 1.95 MB
- Format:
- Adobe Portable Document Format