U nuglaanshaha fulinta algorithm-ka-ka-dambeysta ee sirta ah ee Kyber

Hirgelinta Kyber encryption algorithm, kaas oo ku guuleystay tartankii algorithographics-ka u adkeysanaya xoogga caarada ee kumbuyuutarka quantum, nuglaanta ayaa la aqoonsaday taas oo u oggolaanaysa weerarrada kanaalka-dhinac inay dib u abuuraan furayaasha sirta ah ee ku saleysan cabbiraadda waqtiga hawlgallada inta lagu jiro fur-furka ciphertext uu bixiyay qofka wax weeraray. Dhibaatadu waxay saamaysaa labadaba hirgelinta tixraaca ee CRYSTALS-Kyber KEM ee habka xidhitaanka muhiimka ah iyo qolal saddexaad oo badan oo Kyber karti u leh maktabadaha, oo ay ku jirto maktabadda pqcrypto ee loo isticmaalo farriinta Signal-ka.

Nuxurka nuglaanshaha, ee helay magaca koodka KyberSlash, waa adeegsiga hawlgalka qaybinta "t = ((t

Daniel J. Bernstein, oo ah khabiir caan ah oo ku takhasusay cilmiga cryptography, ayaa awooday inuu diyaariyo bandhig shaqo oo caddaynaya in weerarka lagu fulin karo ficil ahaan. Laba ka mid ah seddexda tijaabo ee la sameeyay, marka koodhka uu ku shaqeynayo guddiga Raspberry Pi 2, waxaa suurtagal ah in si buuxda dib loo sameeyo Kyber-512 furaha gaarka ah iyadoo lagu saleynayo cabbirka xogta waqtiga goynta. Habka sidoo kale waxaa loo habeyn karaa furayaasha Kyber-768 iyo Kyber-1024. Si si guul leh loo fuliyo weerarka, waxaa lagama maarmaan ah in qoraalka uu qeexay qofka weerarka geystay lagu farsameeyo iyadoo la adeegsanayo lamaane isku mid ah iyo in waqtiga fulinta si sax ah loo cabbiri karo.

Libaax kale (KyberSlash2) ayaa lagu aqoonsaday maktabadaha qaarkood, taas oo sidoo kale ku dhacda isticmaalka qiimaha sirta ah marka la fulinayo qaybinta. Farqiga u dhexeeya ikhtiyaarka koowaad ayaa hoos ugu soo dhacaya wicitaanka marxaladda sirta ah (ee poly_compress iyo polyvec_compress functional), ee maaha inta lagu jiro fur-furan. Si kastaba ha ahaatee, ikhtiyaarka labaad ayaa laga yaabaa inay faa'iido u leedahay weerarka kaliya marka nidaamka loo isticmaalo hawlgallada dib-u-qorid ee soo-saarka ciphertext loo tixgeliyo qarsoodi.

Nuglaanta ayaa mar hore lagu hagaajiyay maktabadaha:

  • zig/lib/std/crypto/kyber_d00.zig (Disembar 22),
  • pq-crystals/kyber/ref (Diisambar 30),
  • symbolicsoft/kyber-k2so (Diisambar 19),
  • Cloudflare/goobo (Janaayo 8),
  • aws/aws-lc/crypto/kyber (Janaayo 4),
  • liboqs/src/kem/kyber (8 Janaayo).

Maktabadaha aysan markii hore saameyn ku yeelan baylahdu:

  • boringssl/crypto/kyber,
  • filippo.io/mlkem768,
  • formosa-crypto/libjade/geed/main/src/crypto_kem,
  • kyber/common/amd64/avx2,
  • formosa-crypto/libjade/tree/main/src/crypto_kem/kyber/common/amd64/ref,
  • pq-crystals/kyber/avx2,
  • pqclean/crypto_kem/kyber*/avx2.

Nuglaanta ayaa weli ah mid aan lagu daboolin maktabadaha:

  • antontutoveanu/crystals-kyber-javascript,
  • Argyle-Software/kyber,
  • debian / src / liboqs / aan degganayn / src / kem / kyber,
  • kudelskisecurity/crystals-go,
  • mupq/pqm4/crypto_kem/kyber* (Diisambar 20, kaliya 1 nooca nuglaanta ayaa go'an),
  • PQClean/PQClean/crypto_kem/kyber*/arch64,
  • PQClean/PQClean/crypto_kem/kyber*/ nadiif ah,
  • randombit/botan (Diisambar 20, kaliya 1 nuglaanta ayaa go'an),
  • rustpq/pqcrypto/pqcrypto-kyber ( hagaajin ayaa lagu daray libsignal Janaayo 5, laakiin nuglaanta weli laguma hagaajin pqcrypto-kyber lafteeda).

Source: opennet.ru

Add a comment