Fault Attack on SQIsign

被引:0
|
作者
Lee, Jeonghwan [1 ]
Heo, Donghoe [1 ]
Kim, Hyeonhak [1 ]
Kim, Gyusang [1 ]
Kim, Suhri [3 ]
Kim, Heeseok [2 ]
Hong, Seokhie [1 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
[2] Korea Univ, Dept AI Cyber Secur, Coll Sci & Technol, Sejong 30019, South Korea
[3] Sungshin Womens Univ, Sch Math Stat & Data Sci, Seoul 02844, South Korea
基金
新加坡国家研究基金会;
关键词
Isogeny; Quaternion Algebra; Post-Quantum Cryptography; Fault Attack;
D O I
10.1007/978-3-031-62746-0_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce the first fault attack on SQIsign. By injecting a fault into the ideal generator during the commitment phase, we demonstrate a meaningful probability of inducing the generation of order O-0. The probability is bounded by one parameter, the degree of commitment isogeny. We also show that the probability can be reasonably estimated by assuming uniform randomness of a random variable, and provide empirical evidence supporting the validity of this approximation. In addition, we identify a loop-abort vulnerability due to the iterative structure of the isogeny operation. Exploiting these vulnerabilities, we present key recovery fault attack scenarios for two versions of SQIsign-one deterministic and the other randomized. We then analyze the time complexity and the number of queries required for each attack. Finally, we discuss straightforward countermeasures that can be implemented against the attack.
引用
收藏
页码:54 / 76
页数:23
相关论文
共 50 条
  • [41] Instruction-Fetching Attack and Practice in Collision Fault Attack on AES
    Jiang, Huilong
    Zhu, Xiang
    Han, Jianwei
    SYMMETRY-BASEL, 2022, 14 (10):
  • [42] A New Type of Fault-Based Attack: Fault Behavior Analysis
    Li, Yang
    Ohta, Kazuo
    Sakiyama, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 177 - 184
  • [43] Fault Model Analysis of DRAM under Electromagnetic Fault Injection Attack
    Liu, Qiang
    Guo, Longtao
    Tang, Honghui
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [44] Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED
    Liu, Feng
    Liu, Xuan
    Meng, Shuai
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 529 - 532
  • [45] Attack-resilient fault detection for interconnected systems under DoS attack
    Liu, Qidong
    Long, Yue
    Li, Tieshan
    Chen, C. L. Philip
    ISA TRANSACTIONS, 2024, 148 : 201 - 211
  • [46] Permanent fault attack on the parameters of RSA with CRT
    Yen, SM
    Moon, S
    Ha, J
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 285 - 296
  • [47] A fault attack against the FOX cipher family
    Breveglieri, L.
    Koren, I.
    Maistri, P.
    FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 98 - 105
  • [48] Probabilistic Analysis of Differential Fault Attack on MIBS
    Gao, Yang
    Wang, Yong-juan
    Yuan, Qing-jun
    Wang, Tao
    Wang, Xiang-bin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (02): : 299 - 306
  • [49] Fault-Based Attack of RSA Authentication
    Pellegrini, Andrea
    Bertacco, Valeria
    Austin, Todd
    2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 2010, : 855 - 860
  • [50] A Fault Attack on the Family of Enocoro Stream Ciphers
    Danner, Julian
    Kreuzer, Martin
    CRYPTOGRAPHY, 2021, 5 (04)