Lattice-Based Cryptography in the Quantum Era: A Survey

Descripción del Articulo

The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators. Lattice-based key encryption is the suggested...

Descripción completa

Detalles Bibliográficos
Autores: Cisneros, Mauricio, Olazabal, Javier
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad de Lima
Repositorio:Revistas - Universidad de Lima
Lenguaje:inglés
OAI Identifier:oai:revistas.ulima.edu.pe:article/6631
Enlace del recurso:https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631
Nivel de acceso:acceso abierto
Materia:post-quantum
lattice-based
quantum computing
kyber
quantum cryptanalysis
id REVULIMA_75a57cdc3d9fb757c1f453aee4c259a2
oai_identifier_str oai:revistas.ulima.edu.pe:article/6631
network_acronym_str REVULIMA
network_name_str Revistas - Universidad de Lima
repository_id_str
spelling Lattice-Based Cryptography in the Quantum Era: A SurveyCriptografía lattice-based en la era cuántica: una revisiónCisneros, MauricioOlazabal, Javierpost-quantumlattice-basedquantum computingkyberquantum cryptanalysispost-quantumlattice-basedquantum computingkyberquantum cryptanalysisThe advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators. Lattice-based key encryption is the suggested solution in multiple instances, as the complexity and randomness that these methods add to message encryption make them one of the best short- and medium-term solutions. In 2016, NIST launched a contest to find algorithms to incorporate into its security standard. Four algorithms from the third round were selected to be standardized, including the lattice-based CRYSTALSkyber. Of the latter, variants have been and are still being developed that manage to amend some weaknesses found in its implementation, such as side-channel attacks or performance issues. This investigation discusses different publications on lattice-based cryptography in conjunction with cryptanalysis in the quantum era.La llegada de la informática cuántica anuncia la inadecuación de la criptografía clásica actual para resistir los ataques dentro de este nuevo paradigma. Los algoritmos cuánticos rompen este tipo de cifrado con una facilidad impresionante, siendo los algoritmos de Shor y Grover los principales culpables. El cifrado de claves basado en celosías es la solución propuesta en múltiples ocasiones, ya que la complejidad y aleatoriedad añadidas al cifrado de mensajes mediante estos métodos los convierten en una de las mejores soluciones a corto y medio plazo. En 2016, el NIST lanzó un concurso para encontrar los algoritmos que formarán parte del estándar de seguridad, y en la tercera ronda se seleccionaron cuatro algoritmo para ser estandarizados, entre ellos uno basado en celosía, CRYSTALS-kyber. A partir de él, se desarrollaron y se están desarrollando variantes que consiguen solventar algunas debilidades encontradas en la implementación, como ataques de canal lateral o problemas de rendimiento. En la presente investigación se discuten diferentes publicaciones relativas a la criptografía basada en celosías en conjunción con el criptoanálisis en la era cuántica.Universidad de Lima2023-12-29info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdftext/htmlhttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/663110.26439/interfases2023.n018.6631Interfases; No. 018 (2023); 281-299Interfases; Núm. 018 (2023); 281-299Interfases; n. 018 (2023); 281-2991993-491210.26439/interfases2023.n018reponame:Revistas - Universidad de Limainstname:Universidad de Limainstacron:ULIMAenghttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631/6682https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631/6885info:eu-repo/semantics/openAccessoai:revistas.ulima.edu.pe:article/66312024-06-06T21:16:21Z
dc.title.none.fl_str_mv Lattice-Based Cryptography in the Quantum Era: A Survey
Criptografía lattice-based en la era cuántica: una revisión
title Lattice-Based Cryptography in the Quantum Era: A Survey
spellingShingle Lattice-Based Cryptography in the Quantum Era: A Survey
Cisneros, Mauricio
post-quantum
lattice-based
quantum computing
kyber
quantum cryptanalysis
post-quantum
lattice-based
quantum computing
kyber
quantum cryptanalysis
title_short Lattice-Based Cryptography in the Quantum Era: A Survey
title_full Lattice-Based Cryptography in the Quantum Era: A Survey
title_fullStr Lattice-Based Cryptography in the Quantum Era: A Survey
title_full_unstemmed Lattice-Based Cryptography in the Quantum Era: A Survey
title_sort Lattice-Based Cryptography in the Quantum Era: A Survey
dc.creator.none.fl_str_mv Cisneros, Mauricio
Olazabal, Javier
author Cisneros, Mauricio
author_facet Cisneros, Mauricio
Olazabal, Javier
author_role author
author2 Olazabal, Javier
author2_role author
dc.subject.none.fl_str_mv post-quantum
lattice-based
quantum computing
kyber
quantum cryptanalysis
post-quantum
lattice-based
quantum computing
kyber
quantum cryptanalysis
topic post-quantum
lattice-based
quantum computing
kyber
quantum cryptanalysis
post-quantum
lattice-based
quantum computing
kyber
quantum cryptanalysis
description The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators. Lattice-based key encryption is the suggested solution in multiple instances, as the complexity and randomness that these methods add to message encryption make them one of the best short- and medium-term solutions. In 2016, NIST launched a contest to find algorithms to incorporate into its security standard. Four algorithms from the third round were selected to be standardized, including the lattice-based CRYSTALSkyber. Of the latter, variants have been and are still being developed that manage to amend some weaknesses found in its implementation, such as side-channel attacks or performance issues. This investigation discusses different publications on lattice-based cryptography in conjunction with cryptanalysis in the quantum era.
publishDate 2023
dc.date.none.fl_str_mv 2023-12-29
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631
10.26439/interfases2023.n018.6631
url https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631
identifier_str_mv 10.26439/interfases2023.n018.6631
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631/6682
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631/6885
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
text/html
dc.publisher.none.fl_str_mv Universidad de Lima
publisher.none.fl_str_mv Universidad de Lima
dc.source.none.fl_str_mv Interfases; No. 018 (2023); 281-299
Interfases; Núm. 018 (2023); 281-299
Interfases; n. 018 (2023); 281-299
1993-4912
10.26439/interfases2023.n018
reponame:Revistas - Universidad de Lima
instname:Universidad de Lima
instacron:ULIMA
instname_str Universidad de Lima
instacron_str ULIMA
institution ULIMA
reponame_str Revistas - Universidad de Lima
collection Revistas - Universidad de Lima
repository.name.fl_str_mv
repository.mail.fl_str_mv
_version_ 1841719315061014528
score 12.860346
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).