{"id":50720,"date":"2023-02-23T16:22:12","date_gmt":"2023-02-23T16:22:12","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34355\/Post-Quantum-Algorithm-Vulnerable-To-Side-Channel-Attacks.html"},"modified":"2023-02-23T16:22:12","modified_gmt":"2023-02-23T16:22:12","slug":"post-quantum-algorithm-vulnerable-to-side-channel-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/","title":{"rendered":"Post-Quantum Algorithm Vulnerable To Side Channel Attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/quantum-encryption.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Researchers in Sweden say they have found a way to break a specific implementation of CRYSTALS-Kyber, one of a handful of \u201cpost-quantum\u201d public key encryption algorithms <a href=\"https:\/\/www.scmagazine.com\/analysis\/emerging-technology\/nist-unveils-four-algorithms-that-will-underpin-new-quantum-proof-cryptography-standards\" target=\"_blank\" rel=\"noreferrer noopener\">chosen to underpin<\/a> future U.S. government encryption standards.<\/p>\n<p>According to a <a rel=\"noreferrer noopener\" href=\"https:\/\/eprint.iacr.org\/2022\/1713.pdf\" target=\"_blank\">paper<\/a> published by the KTH Royal Institute in Sweden, the algorithm \u2014 one of a number selected by both the U.S. National Institute for Standards and Technology <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/analysis\/encryption\/how-the-nsa-is-getting-ready-for-the-coming-quantum-codebreaking-revolution\" target=\"_blank\">and the NSA<\/a> for future encryption standards and meant to withstand hacks from a future quantum computer \u2014 is vulnerable to a novel side channel attack.<\/p>\n<p>Such attacks avoid directly targeting a system or hardware\u2019s defenses, instead leveraging traces of the physical signals they emit (such as supply current, execution time or electromagnetic emissions) to extract secrets.<\/p>\n<p>More recently, the advent of deep learning-based side channel analysis has made such attacks particularly relevant for breaking encryption systems and recovering secret keys. Apart from improving the effectiveness of some attacks, it has also allowed for attacks on true random number generators and physical unclonable functions, as well as non-differential message and secret key recovery attacks on post-quantum encryption algorithms.<\/p>\n<p>\u201cDeep learning based side-channel attacks can overcome conventional countermeasures such as masking, shuffling, random delays insertion, constant-weight encoding, code polymorphism, and randomized clock,\u201d wrote researchers Elena Dubrova, Kalle Ngo and Joel G\u00e4rtner.<\/p>\n<p>Encryption algorithms rely on a technique known as \u201cmasking\u201d to prevent leakage of actionable emissions and defend against side channel attacks. Using a newly developed training method for neural networks, the researchers discovered a way to extract message bits for high-order masked implementations with the probability above 99%. They also developed a new message recovery method that manipulates ciphertexts to increase the leakage of message bits, improving the rate of message recovery and eventually extracting the algorithm\u2019s secret key.<\/p>\n<p>There are different orders of complexity for this type of masking, and previous experiments have found a way to execute successful side channel attacks against algorithms with third-order masked software implementations. The method developed by KTH was successful in breaking CRYSTALS-Kyber using fifth-order implementations.<\/p>\n<p>\u201cTo the best of our knowledge, no side-channel attack on a higher than the third order masked implementation of any LWE\/LWR PKE\/KEM scheme has been demonstrated until now. The presented approach is not specific for CRYSTALS-Kyber and can potentially be applied to other LWE\/LWR PKE\/KEM schemes,\u201d the authors wrote.<\/p>\n<h2>NIST official says no need for panic<\/h2>\n<p>CRYSTALS-Kyber is one of four post-quantum algorithms selected by NIST after a rigorous, multi-year vetting process to develop next generation encryption standards. While the other three are meant for digital signature and identity verification, CRYSTALS-Kyber is the only general purpose algorithm selected thus far.<\/p>\n<p>For its part, NIST has long been aware of this possibility. Because a cryptographically-relevant quantum computer (or one capable of breaking classical encryption) <a href=\"https:\/\/www.scmagazine.com\/analysis\/risk-management\/quantum-computing-may-transform-cybersecurity-eventually-but-not-yet\" target=\"_blank\" rel=\"noreferrer noopener\">has yet to be developed<\/a>, researchers must base their choices on mathematical estimations of what a quantum computer might do. That\u2019s one reason why the agency\u2019s vetting process includes a number of backup options in case any algorithm is broken, including three possible replacements for CRYSTALS-Kyber.<\/p>\n<p>That means that the algorithms we think can protect us might actually fall short, and NIST officials have noted that each round of the post-quantum cryptography selection process has revealed a previously unknown or unforeseen weakness in one of the algorithms. In fact, this isn\u2019t even the first flaw found in a post-quantum algorithm: last year another finalist, SIKE, was removed from consideration after Belgian researchers cracked it <a href=\"https:\/\/interestingengineering.com\/innovation\/math-theorem-cracks-us-encryption-algorithm\" target=\"_blank\" rel=\"noreferrer noopener\">in just over an hour<\/a> using a decades-old math theory.<\/p>\n<p>However, Dustin Moody, a mathematician in NIST\u2019s computer security division, told SC Media that while the agency welcomes the new research, he does not believe it represents a fatal flaw in CRYSTALS-Kyber and said NIST currently has no plans to replace or deprioritize the algorithm.<\/p>\n<p>Often, encryption schemes can be tweaked or altered to account for a newly discovered flaw, or experts can develop countermeasures that prevent the kind of leakage that could be used in a side channel attack. Moody said that while \u201ca side channel attack can fatally kill an algorithm, with this particular paper, we don\u2019t feel it does that in any way.\u201d<\/p>\n<p>\u201cOn this particular implementation of Kyber, we can use this [method] to break it under the circumstances in the experiment that they\u2019re running. So it breaks a particular implementation that they\u2019re working with, but it didn\u2019t break the algorithm in general,\u201d he said, later adding \u201cIt doesn\u2019t say anything about the security of the algorithm itself. It didn\u2019t exploit some flaw or design weakness to show that you\u2019ll be able to attack it more generally.\u201d<\/p>\n<p>Those thoughts were echoed by Ali El Kaafarani, CEO of PQShield, which makes and sells quantum-resistant technologies. The paper appears to highlight a valid side channel attack method, but not one necessarily specific to CRYSTALS-Kyber, and it doesn&#8217;t unearth any new, fundamental weaknesses in the algorithm or its underlying mathematics.<\/p>\n<p>\u201cIt&#8217;s important to understand the difference between an algorithm and its potentially many different implementations. Any algorithm can and will inevitably have many non-secure\/broken implementations, this doesn\u2019t mean that the algorithm itself is broken, otherwise people wouldn\u2019t still be using RSA\/ECC now,&#8221; El Kaafarani said.<\/p>\n<p>Still, such adjustments do come with real tradeoffs. The algorithms selected by NIST were done in part based on their efficiency. Every new protection added to account for side channel leakage slows down its performance.<\/p>\n<p>\u201cFor CRYSTALS-Kyber\u2026we asked the cryptographic community to do a lot of work here, and in the second and third rounds of our process, research seemed to show that to protect Kyber pretty well, it would be about twice as slow when you added on lots of countermeasures to protect it from side channel attacks,\u201d said Moody.<\/p>\n<p>Last year, NIST announced that it would integrate four selected post-quantum algorithms into U.S. encryption standards by 2024. They include one algorithm for general encryption purposes (<a rel=\"noreferrer noopener\" href=\"https:\/\/pq-crystals.org\/kyber\/index.shtml\" target=\"_blank\">CRYSTALS-Kyber<\/a>) and another three for digital signatures and identity verification (<a rel=\"noreferrer noopener\" href=\"https:\/\/pq-crystals.org\/dilithium\/index.shtml\" target=\"_blank\">CRYSTALS-Dilithium<\/a>, <a rel=\"noreferrer noopener\" href=\"https:\/\/falcon-sign.info\/\" target=\"_blank\">Falcon<\/a> and <a rel=\"noreferrer noopener\" href=\"https:\/\/sphincs.org\/\" target=\"_blank\">Sphincs+<\/a>). Their use <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/analysis\/emerging-technology\/white-house-rolls-out-new-timelines-mandates-for-post-quantum-encryption-replacement\" target=\"_blank\">will be mandatory<\/a> for most civilian federal agencies per a White House national security memorandum, and many industries and international standards bodies rely on NIST standards when developing their own encryption policies.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34355\/Post-Quantum-Algorithm-Vulnerable-To-Side-Channel-Attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":50721,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[168],"class_list":["post-50720","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineflawcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Post-Quantum Algorithm Vulnerable To Side Channel Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Post-Quantum Algorithm Vulnerable To Side Channel Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T16:22:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/quantum-encryption.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Post-Quantum Algorithm Vulnerable To Side Channel Attacks\",\"datePublished\":\"2023-02-23T16:22:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/\"},\"wordCount\":1059,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks.jpg\",\"keywords\":[\"headline,flaw,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/\",\"name\":\"Post-Quantum Algorithm Vulnerable To Side Channel Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks.jpg\",\"datePublished\":\"2023-02-23T16:22:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks.jpg\",\"width\":1280,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Post-Quantum Algorithm Vulnerable To Side Channel Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Post-Quantum Algorithm Vulnerable To Side Channel Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Post-Quantum Algorithm Vulnerable To Side Channel Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-02-23T16:22:12+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/quantum-encryption.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Post-Quantum Algorithm Vulnerable To Side Channel Attacks","datePublished":"2023-02-23T16:22:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/"},"wordCount":1059,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/post-quantum-algorithm-vulnerable-to-side-channel-attacks.jpg","keywords":["headline,flaw,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/","name":"Post-Quantum Algorithm Vulnerable To Side Channel Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/post-quantum-algorithm-vulnerable-to-side-channel-attacks.jpg","datePublished":"2023-02-23T16:22:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/post-quantum-algorithm-vulnerable-to-side-channel-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/post-quantum-algorithm-vulnerable-to-side-channel-attacks.jpg","width":1280,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/post-quantum-algorithm-vulnerable-to-side-channel-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawcryptography\/"},{"@type":"ListItem","position":3,"name":"Post-Quantum Algorithm Vulnerable To Side Channel Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50720"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50720\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/50721"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}