Paper 2015/1083

Implementation Attacks on Post-Quantum Cryptographic Schemes

Mostafa Taha and Thomas Eisenbarth


Post-quantum cryptographic schemes have been developed in the last decade in response to the rise of quantum computers. Fortunately, several schemes have been developed with quantum resistance. However, there is very little effort in evaluating and comparing these schemes in the embedded settings. Low cost embedded devices represents a highly-constraint environment that challenges all post-quantum cryptographic schemes. Moreover, there are even fewer efforts in evaluating the security of these schemes against implementation attacks including side-channel and fault attacks. It is commonly accepted that, any embedded cryptographic module that is built without a sound countermeasure, can be easily broken. Therefore, we investigate the question: Are we ready to implement post-quantum cryptographic schemes on embedded systems? We present an exhaustive survey of research efforts in designing embedded modules of post-quantum cryptographic schemes and the efforts in securing these modules against implementation attacks. Unfortunately, the study shows that: we are not ready yet to implement any post-quantum cryptographic scheme in practical embedded systems. There is still a considerable amount of research that needs to be conducted before reaching a satisfactory level of security.

Available format(s)
Publication info
Published elsewhere. Major revision. IEEE International Conference on Anti-Cybercrime (ICACC-2015)
Contact author(s)
mtaha @ vt edu
2015-11-09: received
Short URL
Creative Commons Attribution


      author = {Mostafa Taha and Thomas Eisenbarth},
      title = {Implementation Attacks on Post-Quantum Cryptographic Schemes},
      howpublished = {Cryptology ePrint Archive, Paper 2015/1083},
      year = {2015},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.