NISTs Quantum-Proof Algorithm Has a Bug, Analysts Say

  /     /     /  
Publicated : 23/11/2024   Category : security


NISTs Quantum-Proof Algorithm Has a Bug, Analysts Say


A team has found that the Crystals-Kyber encryption algorithm is open to side-channel attacks, under certain implementations.



One of the four post-quantum computing encryption algorithm standards selected by the US National Institute of Standards and Technology (NIST) for public key encryption is open to side-channel attacks, researchers warn.
A new paper published by a team from the Royal Institute of Technology in Sweden reported that
Crystal-Kyber
implementations under certain masked implementation conditions could be vulnerable.
Crystals-Kyber has been selected by the NIST as a public-key encryption and key encapsulation mechanism to be standardized, the
papers abstract explained
. It is also included in the NSAs suite of cryptographic algorithms recommended for national security systems. This makes it important to evaluate the resistance of Crystals-Kybers implementations to side-channel attacks.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
NISTs Quantum-Proof Algorithm Has a Bug, Analysts Say