NIST's Quantum-Proof Algorithm Has a Bug, Analysts Say

A team has found that the Crystals-Kyber encryption algorithm is open to side-channel attacks, under certain implementations.

Dark Reading Staff, Dark Reading

March 6, 2023

1 Min Read
Abstract image for quantum data encryption
Source: sakkmesterke via Alamy Stock Photo

One of the four post-quantum computing encryption algorithm standards selected by the US National Institute of Standards and Technology (NIST) for public key encryption is open to side-channel attacks, researchers warn.

A new paper published by a team from the Royal Institute of Technology in Sweden reported that Crystal-Kyber implementations under certain masked implementation conditions could be vulnerable.

"Crystals-Kyber has been selected by the NIST as a public-key encryption and key encapsulation mechanism to be standardized," the paper's abstract explained. "It is also included in the NSA's suite of cryptographic algorithms recommended for national security systems. This makes it important to evaluate the resistance of Crystals-Kyber's implementations to side-channel attacks."

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights