You are here

AN INVESTIGATION ON PRACTICAL ASPECTS OF POST-QUANTUM CRYPTOGRAPHY

Download pdf | Full Screen View

Date Issued:
2024
Abstract/Description:
The security of the current public-key cryptographic schemes, based on integer factorization and discrete logarithm problems, is expected to be totally broken with the development of quantum computers utilizing Shor’s algorithm. As a result, The National Institute of Standards and Technology (NIST) initiated the Post-Quantum Cryptography (PQC) standardization process in 2016, inviting researchers to submit candidate algorithms that are both resistant to quantum attacks and efficient for real world applications. Researchers have since studied various aspects of the candidate algorithms, such as their security against quantum attacks and efficient implementation on different platforms. In this thesis, we investigate the practical aspects of Post-Quantum Cryptography and contribute to several topics. First, we focus on the knapsack problem and its security under classical and quantum attacks. Second, we improve the secure biometric template generation algorithm NTT-Sec, proposing an enhanced version, NTT-Sec-R, and providing an in-depth design and security analysis. Third, we work on optimizing implementations of the post-quantum secure signature scheme LESS and polynomial inversion algorithms for code-based schemes. Finally, we analyze a proposed countermeasure for the exposure model of SIKE, the isogeny-based scheme that is a candidate in NIST’s Round 4.
Title: AN INVESTIGATION ON PRACTICAL ASPECTS OF POST-QUANTUM CRYPTOGRAPHY.
26 views
6 downloads
Name(s): Karagoz, Emrah , author
Persichetti, Edoardo , Thesis advisor
Karabina, Koray, Thesis advisor
Florida Atlantic University, Degree grantor
Department of Mathematical Sciences
Charles E. Schmidt College of Science
Type of Resource: text
Genre: Electronic Thesis Or Dissertation
Date Created: 2024
Date Issued: 2024
Publisher: Florida Atlantic University
Place of Publication: Boca Raton, Fla.
Physical Form: application/pdf
Extent: 171 p.
Language(s): English
Abstract/Description: The security of the current public-key cryptographic schemes, based on integer factorization and discrete logarithm problems, is expected to be totally broken with the development of quantum computers utilizing Shor’s algorithm. As a result, The National Institute of Standards and Technology (NIST) initiated the Post-Quantum Cryptography (PQC) standardization process in 2016, inviting researchers to submit candidate algorithms that are both resistant to quantum attacks and efficient for real world applications. Researchers have since studied various aspects of the candidate algorithms, such as their security against quantum attacks and efficient implementation on different platforms. In this thesis, we investigate the practical aspects of Post-Quantum Cryptography and contribute to several topics. First, we focus on the knapsack problem and its security under classical and quantum attacks. Second, we improve the secure biometric template generation algorithm NTT-Sec, proposing an enhanced version, NTT-Sec-R, and providing an in-depth design and security analysis. Third, we work on optimizing implementations of the post-quantum secure signature scheme LESS and polynomial inversion algorithms for code-based schemes. Finally, we analyze a proposed countermeasure for the exposure model of SIKE, the isogeny-based scheme that is a candidate in NIST’s Round 4.
Identifier: FA00014549 (IID)
Degree granted: Dissertation (PhD)--Florida Atlantic University, 2024.
Collection: FAU Electronic Theses and Dissertations Collection
Note(s): Includes bibliography.
Subject(s): Cryptography
Knapsack problem (Mathematics)
Computer science
Persistent Link to This Record: http://purl.flvc.org/fau/fd/FA00014549
Use and Reproduction: Copyright © is held by the author with permission granted to Florida Atlantic University to digitize, archive and distribute this item for non-profit research and educational purposes. Any reuse of this item in excess of fair use or other copyright exemptions requires permission of the copyright holder.
Use and Reproduction: http://rightsstatements.org/vocab/InC/1.0/
Host Institution: FAU