Lattice-Based Cryptography in the Quantum Era: A Survey
Descripción del Articulo
The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators. Lattice-based key encryption is the suggested...
Autores: | , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2023 |
Institución: | Universidad de Lima |
Repositorio: | Revistas - Universidad de Lima |
Lenguaje: | inglés |
OAI Identifier: | oai:revistas.ulima.edu.pe:article/6631 |
Enlace del recurso: | https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631 |
Nivel de acceso: | acceso abierto |
Materia: | post-quantum lattice-based quantum computing kyber quantum cryptanalysis |
id |
REVULIMA_75a57cdc3d9fb757c1f453aee4c259a2 |
---|---|
oai_identifier_str |
oai:revistas.ulima.edu.pe:article/6631 |
network_acronym_str |
REVULIMA |
network_name_str |
Revistas - Universidad de Lima |
repository_id_str |
|
spelling |
Lattice-Based Cryptography in the Quantum Era: A SurveyCriptografía lattice-based en la era cuántica: una revisiónCisneros, MauricioOlazabal, Javierpost-quantumlattice-basedquantum computingkyberquantum cryptanalysispost-quantumlattice-basedquantum computingkyberquantum cryptanalysisThe advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators. Lattice-based key encryption is the suggested solution in multiple instances, as the complexity and randomness that these methods add to message encryption make them one of the best short- and medium-term solutions. In 2016, NIST launched a contest to find algorithms to incorporate into its security standard. Four algorithms from the third round were selected to be standardized, including the lattice-based CRYSTALSkyber. Of the latter, variants have been and are still being developed that manage to amend some weaknesses found in its implementation, such as side-channel attacks or performance issues. This investigation discusses different publications on lattice-based cryptography in conjunction with cryptanalysis in the quantum era.La llegada de la informática cuántica anuncia la inadecuación de la criptografía clásica actual para resistir los ataques dentro de este nuevo paradigma. Los algoritmos cuánticos rompen este tipo de cifrado con una facilidad impresionante, siendo los algoritmos de Shor y Grover los principales culpables. El cifrado de claves basado en celosías es la solución propuesta en múltiples ocasiones, ya que la complejidad y aleatoriedad añadidas al cifrado de mensajes mediante estos métodos los convierten en una de las mejores soluciones a corto y medio plazo. En 2016, el NIST lanzó un concurso para encontrar los algoritmos que formarán parte del estándar de seguridad, y en la tercera ronda se seleccionaron cuatro algoritmo para ser estandarizados, entre ellos uno basado en celosía, CRYSTALS-kyber. A partir de él, se desarrollaron y se están desarrollando variantes que consiguen solventar algunas debilidades encontradas en la implementación, como ataques de canal lateral o problemas de rendimiento. En la presente investigación se discuten diferentes publicaciones relativas a la criptografía basada en celosías en conjunción con el criptoanálisis en la era cuántica.Universidad de Lima2023-12-29info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdftext/htmlhttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/663110.26439/interfases2023.n018.6631Interfases; No. 018 (2023); 281-299Interfases; Núm. 018 (2023); 281-299Interfases; n. 018 (2023); 281-2991993-491210.26439/interfases2023.n018reponame:Revistas - Universidad de Limainstname:Universidad de Limainstacron:ULIMAenghttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631/6682https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631/6885info:eu-repo/semantics/openAccessoai:revistas.ulima.edu.pe:article/66312024-06-06T21:16:21Z |
dc.title.none.fl_str_mv |
Lattice-Based Cryptography in the Quantum Era: A Survey Criptografía lattice-based en la era cuántica: una revisión |
title |
Lattice-Based Cryptography in the Quantum Era: A Survey |
spellingShingle |
Lattice-Based Cryptography in the Quantum Era: A Survey Cisneros, Mauricio post-quantum lattice-based quantum computing kyber quantum cryptanalysis post-quantum lattice-based quantum computing kyber quantum cryptanalysis |
title_short |
Lattice-Based Cryptography in the Quantum Era: A Survey |
title_full |
Lattice-Based Cryptography in the Quantum Era: A Survey |
title_fullStr |
Lattice-Based Cryptography in the Quantum Era: A Survey |
title_full_unstemmed |
Lattice-Based Cryptography in the Quantum Era: A Survey |
title_sort |
Lattice-Based Cryptography in the Quantum Era: A Survey |
dc.creator.none.fl_str_mv |
Cisneros, Mauricio Olazabal, Javier |
author |
Cisneros, Mauricio |
author_facet |
Cisneros, Mauricio Olazabal, Javier |
author_role |
author |
author2 |
Olazabal, Javier |
author2_role |
author |
dc.subject.none.fl_str_mv |
post-quantum lattice-based quantum computing kyber quantum cryptanalysis post-quantum lattice-based quantum computing kyber quantum cryptanalysis |
topic |
post-quantum lattice-based quantum computing kyber quantum cryptanalysis post-quantum lattice-based quantum computing kyber quantum cryptanalysis |
description |
The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators. Lattice-based key encryption is the suggested solution in multiple instances, as the complexity and randomness that these methods add to message encryption make them one of the best short- and medium-term solutions. In 2016, NIST launched a contest to find algorithms to incorporate into its security standard. Four algorithms from the third round were selected to be standardized, including the lattice-based CRYSTALSkyber. Of the latter, variants have been and are still being developed that manage to amend some weaknesses found in its implementation, such as side-channel attacks or performance issues. This investigation discusses different publications on lattice-based cryptography in conjunction with cryptanalysis in the quantum era. |
publishDate |
2023 |
dc.date.none.fl_str_mv |
2023-12-29 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631 10.26439/interfases2023.n018.6631 |
url |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631 |
identifier_str_mv |
10.26439/interfases2023.n018.6631 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631/6682 https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6631/6885 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf text/html |
dc.publisher.none.fl_str_mv |
Universidad de Lima |
publisher.none.fl_str_mv |
Universidad de Lima |
dc.source.none.fl_str_mv |
Interfases; No. 018 (2023); 281-299 Interfases; Núm. 018 (2023); 281-299 Interfases; n. 018 (2023); 281-299 1993-4912 10.26439/interfases2023.n018 reponame:Revistas - Universidad de Lima instname:Universidad de Lima instacron:ULIMA |
instname_str |
Universidad de Lima |
instacron_str |
ULIMA |
institution |
ULIMA |
reponame_str |
Revistas - Universidad de Lima |
collection |
Revistas - Universidad de Lima |
repository.name.fl_str_mv |
|
repository.mail.fl_str_mv |
|
_version_ |
1841719315061014528 |
score |
12.860346 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).