2020
DOI: 10.48550/arxiv.2005.04344
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions

Sreeja Chowdhury,
Ana Covic,
Rabin Yu Acharya
et al.

Abstract: Over the past decades, quantum technology has seen consistent progress, with notable recent developments in the field of quantum computers. Traditionally, this trend has been primarily seen as a serious risk for cryptography; however, a positive aspect of quantum technology should also be stressed. In this regard, viewing this technology as a resource for honest parties rather than adversaries, it may enhance not only the security, but also the performance of specific cryptographic schemes. While considerable … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 130 publications
0
4
0
Order By: Relevance
“…Figure 2 shows the algorithms developed in these categories and submitted to NIST for evaluation in 3 different rounds [4]. These categories and their importance to resource-constraint IoT networks are explained as follows [4], [7] [8] [9]. In NIST Post-quantum cryptography standardization, 23 signature and 59 encryption schemes were submitted in the initial round at the end of 2017.…”
Section: Post-quantum Cryptography Typesmentioning
confidence: 99%
“…Figure 2 shows the algorithms developed in these categories and submitted to NIST for evaluation in 3 different rounds [4]. These categories and their importance to resource-constraint IoT networks are explained as follows [4], [7] [8] [9]. In NIST Post-quantum cryptography standardization, 23 signature and 59 encryption schemes were submitted in the initial round at the end of 2017.…”
Section: Post-quantum Cryptography Typesmentioning
confidence: 99%
“…The nature of the physical token essentially determines the nature of the challenges and the responses, as well as the operation of the PUF. One can find a broad range of PUFs in the literature [9][10][11], and electronic PUFs is the most well studied class, mainly because of their compatibility with existing technology and hardware. However, they are susceptible to various types of modelling and side-channel attacks [10,[12][13][14][15], and current research is focused on the development of new schemes, which offer provable security against such attacks (e.g., see [16] and references therein).…”
Section: Introductionmentioning
confidence: 99%
“…One can find a broad range of PUFs in the literature [9][10][11], and electronic PUFs is the most well studied class, mainly because of their compatibility with existing technology and hardware. However, they are susceptible to various types of modelling and side-channel attacks [10,[12][13][14][15], and current research is focused on the development of new schemes, which offer provable security against such attacks (e.g., see [16] and references therein). On the contrary, optical PUFs are not fully compatible with existing technology, but they offer many advantages relative to electronic PUFs, including low cost, high complexity, and security against modeling attacks [10,17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation