Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs

Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata Aikata, Sujoy Sinha Roy

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Post-quantum Cryptography (PQC) has reached the verge of standardization competition, with Kyber as a winning candidate. In this work, we demonstrate practical backdoor insertion in Kyber through kleptrography. The backdoor can be inserted using classical techniques like ECDH or post-quantum Classic Mceliece. The inserted backdoor targets the key generation procedure where generated output public keys subliminally leak information about the secret key to the owner of the backdoor. We demonstrate first practical instantiations of such attack at the protocol level by validating it on TLS 1.3.
Original languageEnglish
Title of host publicationGLSVLSI 2024 - Proceedings of the Great Lakes Symposium on VLSI 2024
PublisherAssociation of Computing Machinery
Pages216 - 221
Number of pages6
ISBN (Electronic)9798400706059
DOIs
Publication statusPublished - 12 Jun 2024
Event34th Great Lakes Symposium on VLSI: GLSVLSI 2024 - Tampa Bay Area, United States
Duration: 12 Jun 202414 Jun 2024

Conference

Conference34th Great Lakes Symposium on VLSI
Country/TerritoryUnited States
CityTampa Bay Area
Period12/06/2414/06/24

Keywords

  • ost Quantum Cryptography
  • Kyber
  • Kleptography
  • Backdoors
  • Backdoor
  • Post Quantum Cryptography

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • General Engineering

Cite this