양자내성암호 표준화, 연구 동향 및 전망

  • 박태환 (부산대학교 전기전자컴퓨터공학과) ;
  • 김호원 (부산대학교 전기전자컴퓨터공학과)
  • Published : 2018.10.31

Abstract

최근 양자 컴퓨팅 환경에서도 안전한 양자내성암호에 대한 많은 연구가 진행되고 있으며, 이에 따라 미국 국립표준기술연구소에서는 2017년 11월 30일부터 양자내성암호에 대한 연방 표준화 사업을 진행하고 있다. 현재 표준화 1라운드가 진행되고 있으며, 제출된 양자내성암호들에 대한 안전성 분석이 진행되고 있다. 또한 CHES와 같은 세계 유수의 학회에서도 이러한 양자내성암호에 대한 많은 연구결과들이 발표되고 있으며, 본 논문에서는 양자내성암호 표준화와 연구의 최신 동향을 살펴보며, 이에 따른 향후 연구 전망을 제시하고자 한다.

Keywords

References

  1. D. Jao, R. Azarderakhsh, M. Campagna, C. Costello, L. D. Feo, B. H. A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, J. Renes, V. Soukharev, D. Urbanik, Sike, Tech. rep., National Institute of Standards and Technology, available at https://csrc.nist.gov/projects/post-quantum-cryptography/round-1-submissions (2017).
  2. Kris Gaj, "PQC Hardware API & Fair Benchmarking of PQC", PQCrypt 2018 Recent Result Session, 2018
  3. Barelli, Elise, and Alain Couvreur. "An efficient structural attack on NIST submission DAGS." arXiv preprint arXiv:1805.05429 (2018).
  4. SUPERCOP (System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives), available at https://bench.cr.yp.to/supercop.html
  5. T. Oder, T. Schneider, T. Pöppelmann, and T. Güneysu, "Practical cca2-secure and masked ring-lwe implementation," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 1, pp. 142-174, 2018.
  6. L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehle, "Crystals-dilithium: a lattice-based digital signature scheme," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 1, pp. 238-268, 2018.
  7. H. Seo, Z. Liu, P. Longa, and Z. Hu, "Sidh on arm: Faster modular multiplications for faster post-quantum supersingular isogeny key exchange," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 1-20, 2018.
  8. A. Karmakar, J. M. B. Mera, S. S. Roy, and I. Verbauwhede, "Saber on arm," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 243-266, 2018.
  9. J. Howe, T. Oder, M. Krausz, and T. Gneysu, "Standard lattice-based key encapsulation on embedded devices," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 372-393, 2018.
  10. Amiet, Dorian, Andreas Curiger, and Paul Zbinden. "FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256." IACR Transactions on Cryptographic Hardware and Embedded Systems 2018.1 (2018): 18-39.
  11. Park, A., Shim, K.-A., Koo, N., & Han, D.-G. (2018). Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3), 500-523. https://doi.org/10.13154/tches.v2018.i3.500-523
  12. Albrecht, M., Deo, A., & Paterson, K. (2018). Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3), 173-213. https://doi.org/10.13154/tches.v2018.i3.173-213
  13. Groot Bruinderink, L., & Pessl, P. (2018). Differential Fault Attacks on Deterministic Lattice Signatures. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3), 21-43. https://doi.org/10.13154/tches.v2018.i3.21-43