Combined Fault and DPA Protection for Lattice-Based Cryptography

被引:3
|
作者
Heinz, Daniel [1 ,2 ]
Poeppelmann, Thomas [2 ]
机构
[1] Univ Bundeswehr, Res Inst CODE, D-85579 Munich, Germany
[2] Infineon Technol AG, D-81726 Munich, Germany
基金
欧盟地平线“2020”;
关键词
Cryptography; NIST; Arithmetic; Public key; Microcontrollers; Cathode ray tubes; Transforms; Lattice-based cryptography; module-LWE; Kyber; side-channel attacks; ARM Cortex-M4;
D O I
10.1109/TC.2022.3197073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The progress on constructing quantum computers and the ongoing standardization of post-quantum cryptography (PQC) have led to the development and refinement of promising new digital signature schemes and key encapsulation mechanisms (KEM). Especially lattice-based schemes have gained some popularity in the research community, presumably due to acceptable key, ciphertext, and signature sizes as well as good performance results and cryptographic strength. However, in some practical applications like smart cards, it is also crucial to secure cryptographic implementations against side-channel and fault attacks. In this work, we analyze the so-called redundant number representation (RNR) that can be used to counter side-channel attacks. We show how to avoid security issues with the RNR due to unexpected de-randomization and we apply it to the Kyber KEM and show that the RNR has a very low overhead. We then verify the RNR methodology by practical experiments, using the non-specific t-test methodology and the ChipWhisperer platform. Furthermore, we present a novel countermeasure against fault attacks based on the Chinese remainder theorem (CRT). On an ARM Cortex-M4, our implementation of the RNR and fault countermeasure offers better performance than masking and redundant calculation. Our methods thus have the potential to expand the toolbox of a defender implementing lattice-based cryptography with protection against two common physical attacks.
引用
收藏
页码:1055 / 1066
页数:12
相关论文
共 50 条
  • [1] Lattice-based cryptography
    Regev, Oded
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141
  • [2] Physical Protection of Lattice-Based Cryptography - Challenges and Solutions -
    Khalid, Ayesha
    Oder, Tobias
    Valencia, Felipe
    Neill, Maire O'
    Gueneysu, Tim
    Regazzoni, Francesco
    [J]. PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 365 - 370
  • [3] Lattice-based Cryptography
    Mohsen, Ayman Wagih
    Bahaa-Eldin, Ayman M.
    Sobh, Mohamed Ali
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467
  • [4] Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Martinoli, Marco
    Regazzoni, Francesco
    Oswald, Elisabeth
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [5] Lattice-Based Cryptography: A Survey
    Wang, Xiaoyun
    Xu, Guangwu
    Yu, Yang
    [J]. CHINESE ANNALS OF MATHEMATICS SERIES B, 2023, 44 (06) : 945 - 960
  • [6] Lattice-Based Cryptography:A Survey
    Xiaoyun WANG
    Guangwu XU
    Yang YU
    [J]. Chinese Annals of Mathematics,Series B, 2023, (06) : 945 - 960
  • [7] Lattice-Based Cryptography: A Survey
    Xiaoyun Wang
    Guangwu Xu
    Yang Yu
    [J]. Chinese Annals of Mathematics, Series B, 2023, 44 : 945 - 960
  • [8] Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography
    Ravi, Prasanna
    Chattopadhyay, Anupam
    Bhasin, Shivam
    [J]. PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 188 - 189
  • [9] Symbolic Proofs for Lattice-Based Cryptography
    Barthe, Gilles
    Fan, Xiong
    Gancher, Joshua
    Gregoire, Benjamin
    Jacomme, Charlie
    Shi, Elaine
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 538 - 555
  • [10] Proof of a Shuffle for Lattice-Based Cryptography
    Costa, Nuria
    Martinez, Ramiro
    Morillo, Paz
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 280 - 296