Dissertations - M Tech (CRS)
Permanent URI for this collectionhttp://164.52.219.250:4000/handle/10263/7285
Dissertation submitted in partial fulfilment of the requirements for the degree of Master of Technology in Cryptology and Security
Browse
2 results
Search Results
Item Protecting the Unbalanced Oil and Vinegar Signature Scheme against Side-channel Attack(Indian Statistical Institute, Kolkata, 2024-06) Ojha, Uttam KumarWith the recent development of quantum computing, there is an urge for Post- Quantum Cryptography(PQC). The National Institute of Standards and Technology( NIST) initiated a public process to standardize PQC algorithms to address this issue in 2016. To search for new signature schemes with diverse hardness problems, short signature sizes and fast verification, NIST called for additional digital signature schemes for the PQC in 2022. Based on multivariate cryptography, the Unbalanced Oil and Vinegar(UOV) signature scheme is a candidate for this additional round. This scheme has stood out for two decades of cryptanalysis and has a short signature size and fast verification. We believe this is a potential candidate for this round. As usual, this scheme is mainly designed to resist mathematical attacks; however, deploying this scheme in an actual device leaks unintended information through side-channels such as power consumption. Side-channel analysis helps to exploit those unintended information and recover the secrets of the scheme. Recently, a few attacks have been shown using correlation power analysis in this scheme. Masking is a well-known and provably secure countermeasure against such attacks. In this thesis, we describe the first masked implementation of the UOV scheme. We also produce security proof of our implementation in the probing model.Item Implementation and Performance Testing of Post-Quantum Algorithms in Hyperledger Fabric(Indian Statistical Institute, Kolkata, 2024-07) Swarnakar, MonishaThe potential of distributed ledger technologies, such as blockchain, to create responsible and transparent linkages across a range of application domains has garnered a lot of interest. These methods build redundant networks via hash functions, digital signatures, and asymmetric cryptography. However, attacks employing quantum computers that take advantage of Grover and Shor’s algorithms can compromise the security of the current blockchain architecture.
