ยซKyber Ransomware โ€” Post-Quanten-Kryptografie:
Die Ransomware Kyber nutzt als erste ihrer Art Post-Quanten-Verschlรผsselung. Doch Experten entlarven die Technik als psychologischen Marketing-Trick.ยป

IT-Sicherheit ist einiges mehr als nur gewisse Stichworte und PQC ist auch nur so sicher wie es im ganzen eingesetzt wird. IT-Betrรผger setzen immer auf Trends um die Menschen zu verunsichern und abzufangen.

๐Ÿ” https://www.it-daily.net/shortnews/kyber-ransomware

#kyber #mlkem #PQCryptography #pqc #itsec #ransomeware #betrug #it

Kyber Ransomware: Post-Quanten-Kryptografie

Die Ransomware Kyber nutzt als erste ihrer Art Post-Quanten-Verschlรผsselung. Doch Experten entlarven die Technik als psychologischen Marketing-Trick.

Onlineportal von IT Management

Cryptographic Right Answers: Post Quantum and Rust Edition

[โ€ฆ] Cryptography is everywhere and as a developer you will need to upgrade your projects with post-quantum algorithms, whether because you care about the security of your users, or for compliance reasons. [โ€ฆ]

๐Ÿฆ€ https://kerkour.com/post-quantum-cryptography-recommendations-rust

#rust #cryptography #rustlang #pqc #itsec #itsecurity #security #coding #PQCryptography #postquantum

Cryptographic Right Answers: Post Quantum and Rust Edition

There recently has been a lot of noise about quantum computing breakthroughs recently after Google's articles Quantum frontiers may be closer than they appear and Safeguarding cryptocurrency by disclosing quantum

Sylvain Kerkour

A. Berzati et al., "A Practical Template Attack on CRYSTALS-Dilithium"ยน

This paper presents a new profiling side-channel attack on the signature scheme CRYSTALS-Dilithium, which has been selected by the NIST as the new primary standard for quantum-safe digital signatures. This algorithm has a constant-time implementation with consideration for side-channel resilience. However, it does not protect against attacks that exploit intermediate data leakage. We exploit such a leakage on a vector generated during the signing process and whose costly protection by masking is a matter of debate. We design a template attack that enables us to efficiently predict whether a given coefficient in one coordinate of this vector is zero or not. Once this value has been completely reconstructed, one can recover, using linear algebra methods, part of the secret key that is sufficient to produce universal forgeries. While our paper deeply discusses the theoretical attack path, it also demonstrates the validity of the assumption regarding the required leakage model, from practical experiments with the reference implementation on an ARM Cortex-M4.

#IACR #ResearchPapers #Dilithium #Lattices #PQCryptography #SideChannelAttacks #TemplateAttacks
__
ยน https://eprint.iacr.org/2023/050

A Practical Template Attack on CRYSTALS-Dilithium