Show simple item record

dc.rights.licenseCC-BY-NC-ND
dc.contributor.advisorVassena, M.
dc.contributor.authorCassee, Stijn
dc.date.accessioned2025-07-01T00:01:31Z
dc.date.available2025-07-01T00:01:31Z
dc.date.issued2025
dc.identifier.urihttps://studenttheses.uu.nl/handle/20.500.12932/49107
dc.description.abstractConsidering side channel attacks in cryptography, timing leaks are particularly dangerous as they can be exploited over a network to leak cryptographic secrets. Post-quantum cryptography (PQC) is a new class of cryptography, designed as quantum-safe replace- ment for public-key cryptography schemes in use today which are vulnerable for an attack with a powerful enough quantum computer. This thesis explores the feasibility of finding timing leaks in PQC implementations at the binary level using symbolic execution. The study focuses on three standardized PQC schemes: ML-KEM, ML-DSA, and SLH-DSA, using the Binsec tool for analysis. We developed a benchmarking harness to facilitate experiments with different compilers, optimisation levels, and configurations. The results highlight significant challenges in scaling binary symbolic execution for PQC, with only SLH-DSA completing the analysis within a reasonable time. Known timing leaks, such as the kyberslash vulnerability, were successfully detected in isolated functions. However, full implementation analysis often resulted in timeouts, highlighting the complexity of PQC schemes compared to classical cryptography. We suggest further work on improved methodologies, such as a modular, per-function analysis. Although promising, binary symbolic execution requires substantial effort in configuration and parameter tuning, lim- iting its current usability as a turnkey solution for constant time verification in PQC implementations.
dc.description.sponsorshipUtrecht University
dc.language.isoEN
dc.subjectFinding constant time vulnerabilities introduced by compilers by symbolic execution analysis of compiled code.
dc.titleFinding Timing leaks in Post-Quantum Cryptography Implementations Using Binary Symbolic Execution
dc.type.contentMaster Thesis
dc.rights.accessrightsOpen Access
dc.subject.keywordsPQC; Symbolic Execution; Binsec; Constant Time; Timing Leaks;
dc.subject.courseuuComputing Science
dc.thesis.id46072


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record