Fault Attack on SQIsign

被引:0
|
作者
Lee, Jeonghwan [1 ]
Heo, Donghoe [1 ]
Kim, Hyeonhak [1 ]
Kim, Gyusang [1 ]
Kim, Suhri [3 ]
Kim, Heeseok [2 ]
Hong, Seokhie [1 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
[2] Korea Univ, Dept AI Cyber Secur, Coll Sci & Technol, Sejong 30019, South Korea
[3] Sungshin Womens Univ, Sch Math Stat & Data Sci, Seoul 02844, South Korea
基金
新加坡国家研究基金会;
关键词
Isogeny; Quaternion Algebra; Post-Quantum Cryptography; Fault Attack;
D O I
10.1007/978-3-031-62746-0_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce the first fault attack on SQIsign. By injecting a fault into the ideal generator during the commitment phase, we demonstrate a meaningful probability of inducing the generation of order O-0. The probability is bounded by one parameter, the degree of commitment isogeny. We also show that the probability can be reasonably estimated by assuming uniform randomness of a random variable, and provide empirical evidence supporting the validity of this approximation. In addition, we identify a loop-abort vulnerability due to the iterative structure of the isogeny operation. Exploiting these vulnerabilities, we present key recovery fault attack scenarios for two versions of SQIsign-one deterministic and the other randomized. We then analyze the time complexity and the number of queries required for each attack. Finally, we discuss straightforward countermeasures that can be implemented against the attack.
引用
收藏
页码:54 / 76
页数:23
相关论文
共 50 条
  • [1] A Fault Attack on ECDSA
    Schmidt, Joern-Marc
    Medwed, Marcel
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 93 - 99
  • [2] A Fault Attack on ECDSA
    Schmidt, Joern-Marc
    Medwed, Marcel
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 93 - 99
  • [3] Fault Template Attack Based on Fault Probability
    Wu, Tong
    Zhou, Dawei
    Du, Lei
    Wang, Shiwei
    IEEE ACCESS, 2023, 11 : 71705 - 71713
  • [4] A Faster Software Implementation of SQIsign
    Lin, Kaizhan
    Wang, Weize
    Xu, Zheng
    Zhao, Chang-An
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (09) : 6679 - 6689
  • [5] A Differential Fault Attack on Plantlet
    Maitra, Subhamoy
    Siddhanti, Akhilesh
    Sarkar, Santanu
    IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (10) : 1804 - 1808
  • [6] Fault Attack on SKINNY Cipher
    Navid Vafaei
    Sayandeep Saha
    Nasour Bagheri
    Debdeep Mukhopadhyay
    Journal of Hardware and Systems Security, 2020, 4 (4) : 277 - 296
  • [7] Differential Fault Attack on LEA
    Jap, Dirmanto
    Breier, Jakub
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 265 - 274
  • [8] Differential Fault Attack on GIFT
    XIE, Min
    TIAN, Feng
    Li, Jiaqi
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 669 - 675
  • [9] Correlation fault attack on AES
    Wang X.
    Hu W.
    Tan J.
    Zhu J.
    Tang S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (04): : 192 - 199and208
  • [10] Differential Fault Attack on Rocca
    Anand, Ravi
    Isobe, Takanori
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 283 - 295