Combined Fault and DPA Protection for Lattice-Based Cryptography

被引:3
|
作者
Heinz, Daniel [1 ,2 ]
Poeppelmann, Thomas [2 ]
机构
[1] Univ Bundeswehr, Res Inst CODE, D-85579 Munich, Germany
[2] Infineon Technol AG, D-81726 Munich, Germany
基金
欧盟地平线“2020”;
关键词
Cryptography; NIST; Arithmetic; Public key; Microcontrollers; Cathode ray tubes; Transforms; Lattice-based cryptography; module-LWE; Kyber; side-channel attacks; ARM Cortex-M4;
D O I
10.1109/TC.2022.3197073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The progress on constructing quantum computers and the ongoing standardization of post-quantum cryptography (PQC) have led to the development and refinement of promising new digital signature schemes and key encapsulation mechanisms (KEM). Especially lattice-based schemes have gained some popularity in the research community, presumably due to acceptable key, ciphertext, and signature sizes as well as good performance results and cryptographic strength. However, in some practical applications like smart cards, it is also crucial to secure cryptographic implementations against side-channel and fault attacks. In this work, we analyze the so-called redundant number representation (RNR) that can be used to counter side-channel attacks. We show how to avoid security issues with the RNR due to unexpected de-randomization and we apply it to the Kyber KEM and show that the RNR has a very low overhead. We then verify the RNR methodology by practical experiments, using the non-specific t-test methodology and the ChipWhisperer platform. Furthermore, we present a novel countermeasure against fault attacks based on the Chinese remainder theorem (CRT). On an ARM Cortex-M4, our implementation of the RNR and fault countermeasure offers better performance than masking and redundant calculation. Our methods thus have the potential to expand the toolbox of a defender implementing lattice-based cryptography with protection against two common physical attacks.
引用
收藏
页码:1055 / 1066
页数:12
相关论文
共 50 条
  • [21] Towards Efficient Polynomial Multiplication for Lattice-Based Cryptography
    Du, Chaohui
    Bai, Guoqiang
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1178 - 1181
  • [22] Efficient key revocation in WSN with lattice-based cryptography
    Khan, Ihtiram Raza
    Gupta, Neha
    Hundekari, Sheela
    Bansal, Ashish
    Mahajan, Rupali Atul
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 339 - 348
  • [23] Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk)
    Peikert, Chris
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 54 - 54
  • [24] Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography
    Satilmis, Hami
    Akleylek, Sedat
    [J]. 2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), 2020, : 75 - 79
  • [25] Portable Implementation of Lattice-Based Cryptography Using JavaScript
    20161902341243
    [J]. (1) Graduate School of Mathematics, Kyushu University, Japan; (2) Institute of Mathematics for Industry, Kyushu University, Japan; (3) Department of Electrical Engineering, National Taiwan University, Taiwan; (4) KDDI Laboratories, Taiwan; (5) CREST, Japan Science and Technology Agency, Japan, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [26] Lattice-Based Cryptography: from Reconfigurable Hardware to ASIC
    Oder, Tobias
    Gueneysu, Tim
    Valencia, Felipe
    Khalid, Ayesha
    O'Neill, Maire
    Regazzoni, Francesco
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2016,
  • [27] TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator
    Wan, Lipeng
    Zheng, Fangyu
    Li, Jingqiang
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 249 - 269
  • [28] The implementation of polynomial multiplication for lattice-based cryptography: A survey
    Zeng, Chenkai
    He, Debiao
    Feng, Qi
    Peng, Cong
    Luo, Min
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [29] Computational Differential Privacy from Lattice-Based Cryptography
    Valovich, Filipp
    Alda, Francesco
    [J]. NUMBER-THEORETIC METHODS IN CRYPTOLOGY, 2018, 10737 : 121 - 141
  • [30] Flexible NTT Accelerators for RLWE Lattice-based Cryptography
    Nejatollahi, Hamid
    Cammarota, Rosario
    Dutt, Nikil
    [J]. 2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 329 - 332