Podcast
Root Causes 280: Did an AI Break CRYSTALS-Kyber?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
February 24, 2023
Recent news reports might suggest that an AI-enhanced side attack has defeated the CRYSTALS-Kyber PQC algorithm. In this episode we clarify that Kyber has not been defeated to date and exactly what did occur. We define side channel attack, discuss the broader implications of this attack, and speculate on what would happen if Kyber actually were broken.
Podcast Transcript
Lightly edited for flow and brevity.
So, Jason, when I read this headline my brain exploded because I thought, OH WOW! But I think we’ve learned that there’s more to it than this. Correct?
Therefore, you are gonna see more attacks like this. What it really means is really, really good implementations that are rock solid. And it makes sense, Tim, because I mean CRYSTAL-Kyber hasn’t gone through the standardization process yet to make what is a rock-solid implementation of it standardized. That’s what we are waiting for, and it’s a good example of why we are waiting for it, and good on the white hat community for pressing AI against this and showing a weakness in implementation. Bravo. This is good work. This has to happen but it’s just up to the journalist to not be inaccurate or to sensationalize.
It wasn’t a side channel attack. It was another form of attack, but same thing. We’ve seen poor implementations ruin very good - - bad outcomes for very good intentions, unfortunately. And, hey, that’s what the white hats do. They ruin your day but they make you better
Now my next point that I come to out of this is, again, my initial response when I looked at this was HOLY MOSES, has CRYSTALS-Kyber been broken and if so, what are the implications of that. So I thought maybe it would be fun for you and I to talk about it. Let’s suppose that the headline and subhead as read were what I originally interpreted them to be. Someone had used an AI to determine that CRYSTALS-Kyber was fundamentally not secure as an algorithm. What would the implications of that be?
Just as a reminder for the listener, CRYSTALS-Kyber really is the de facto KEM in the NIST – key encryption module – in the NIST recommendations that we expect to be in use almost all of the time. So, hypothetically, if CRYSTALS-Kyber had to be taken out of the mix the way let’s say SIKE was last year or Rainbow was last year, what would that mean?
And we are gonna report on that here as soon as that’s announced. You know it.
Wow. Ok. Well, anyway, this headlines as you can see, it got our attention real quick, but we will say for the fourth time in this podcast, the CRYSTALS-Kyber encryption algorithm has not been defeated. Rather, this is important progress in understanding how to implement CRYSTALS-Kyber correctly so it cannot be defeated and that’s the research to take away. It’s very important research but don’t worry, we are still good with Kyber for now.

