Reference implementations of PQC
Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
  1. # A note on the security of the included implementations and schemes
  2. This project contains (reference) implementations of cryptographic libraries.
  3. We do not make any security claims about the code included in PQClean.
  4. In the current state, we distribute reference implementations with minor modifications.
  5. We did not perform any extensive security analyses.
  6. This code is suitable for experimental or scientific use.
  7. We recommend careful expert code review before using any of the included implementations in production environments.
  8. See also the [NIST PQC Forum][forum] for discussion about the cryptographic schemes included in PQClean.
  9. ## Current and past security issues
  10. We will attempt to document security vulnerabilities made known to us on a best-effort basis.
  11. If an issue is marked with a date, the issue has been resolved since any commits made after that date.
  12. Again, we emphasise that the code in this repository has not seen any formal analysis or audit!
  13. Use at your own risk.
  14. ### Open issues
  15. * LEDAcryptKEM `leaktime` implementations are known to not be constant-time and expected to have timing side channel vulnerabilities.
  16. <!-- new date line
  17. ### 2019-XX-XX
  18. -->
  19. ### 2020-12-11
  20. * The fix of the timing leak in the CCA transform of FrodoKEM in [PR #303](https://github.com/PQClean/PQClean/pull/303) was ineffective. The FrodoKEM team released another [fix](https://github.com/microsoft/PQCrypto-LWEKE/commit/669522db63850fa64d1a24a47e138e80a59349db) which was ported to PQClean in [PR #367](https://github.com/PQClean/PQClean/pull/367).
  21. ### 2020-06-19
  22. * A potential timing leak was present in the FrodoKEM decapsulation routine, as identified by [Guo, Johansson, and Nilsson](https://eprint.iacr.org/2020/743). This was fixed in [PR #303](https://github.com/PQClean/PQClean/pull/303).
  23. ### 2019-09-24
  24. * All Falcon implementations before [PR #235][PR 235] got merged were insecure. See [EPRINT report 2019/893][2019/893].
  25. ### 2019-09-10
  26. * The included incremental `sha512` implementation was calling `crypto_hashblocks_sha256` before 2019-9-10.
  27. This lead to an insufficient security level of the results of this hash function.
  28. The function was not used in any implementations, though.
  29. See [PR #232][PR 232].
  30. [2019/893]: https://eprint.iacr.org/2019/893
  31. [forum]: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Email-List
  32. [PR 232]: https://github.com/PQClean/PQClean/pull/232
  33. [PR 235]: https://github.com/PQClean/PQClean/pull/235