Feb. 28, 2023, 12:19 p.m. | Bruce Schneier

Schneier on Security www.schneier.com

CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.


Researchers have just published a side-channel attack—using power consumption—against an implementation of the algorithm that was supposed to be resistant against that sort of attack.


The algorithm is not “broken” or “cracked”—despite headlines to the contrary—this is just a side-channel attack. What makes this work really interesting is that the researchers used a machine-learning model to train the system to …

academic papers algorithm algorithms attack channel cracked cryptography crystals-kyber encryption key machine machine learning nist post-quantum post-quantum cryptography power process public quantum quantum computing quantum cryptography researchers side-channel side-channel attack side-channel attacks sort standardization train work

Technical Product Manager, Electronic Warfare - Active Clearance

@ Anduril | Costa Mesa, California, United States

Specialist Operations and Support/ Entry Professional - IT Security, Cyber Security & Governance

@ Norsk Hydro | Jaipur, IN

Embedded Software Engineer, Electronic Warfare

@ Anduril | Costa Mesa, California, United States

Cyber Security Analyst

@ Peraton | Chantilly, VA, United States

Principal Consultant, Proactive Security - Unit 42

@ Palo Alto Networks | Sydney, Australia

Penetration Tester Consultant

@ RSI Security | United States - Remote