Combined Fault and DPA Protection for Lattice-Based Cryptography

被引:3
|
作者
Heinz, Daniel [1 ,2 ]
Poeppelmann, Thomas [2 ]
机构
[1] Univ Bundeswehr, Res Inst CODE, D-85579 Munich, Germany
[2] Infineon Technol AG, D-81726 Munich, Germany
基金
欧盟地平线“2020”;
关键词
Cryptography; NIST; Arithmetic; Public key; Microcontrollers; Cathode ray tubes; Transforms; Lattice-based cryptography; module-LWE; Kyber; side-channel attacks; ARM Cortex-M4;
D O I
10.1109/TC.2022.3197073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The progress on constructing quantum computers and the ongoing standardization of post-quantum cryptography (PQC) have led to the development and refinement of promising new digital signature schemes and key encapsulation mechanisms (KEM). Especially lattice-based schemes have gained some popularity in the research community, presumably due to acceptable key, ciphertext, and signature sizes as well as good performance results and cryptographic strength. However, in some practical applications like smart cards, it is also crucial to secure cryptographic implementations against side-channel and fault attacks. In this work, we analyze the so-called redundant number representation (RNR) that can be used to counter side-channel attacks. We show how to avoid security issues with the RNR due to unexpected de-randomization and we apply it to the Kyber KEM and show that the RNR has a very low overhead. We then verify the RNR methodology by practical experiments, using the non-specific t-test methodology and the ChipWhisperer platform. Furthermore, we present a novel countermeasure against fault attacks based on the Chinese remainder theorem (CRT). On an ARM Cortex-M4, our implementation of the RNR and fault countermeasure offers better performance than masking and redundant calculation. Our methods thus have the potential to expand the toolbox of a defender implementing lattice-based cryptography with protection against two common physical attacks.
引用
收藏
页码:1055 / 1066
页数:12
相关论文
共 50 条
  • [31] On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Rafferty, Ciara
    Regazzoni, Francesco
    O'Neill, Maire
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (03) : 322 - 334
  • [32] Physical Layer Cryptography in Optical Networks: A Lattice-Based Approach
    Boudriga, Noureddine
    Abdallah, Walid
    Hamdi, Mohamed
    [J]. 2010 12TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2011,
  • [33] Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
    Gueneysu, Tim
    Lyubashevsky, Vadim
    Poeppelmann, Thomas
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 530 - 547
  • [34] Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
    Satilmis, Hami
    Akleylek, Sedat
    Lee, Cheng-Chi
    [J]. MATHEMATICS, 2021, 9 (14)
  • [35] Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography
    Hamid Nejatollahi
    Sina Shahhosseini
    Rosario Cammarota
    Nikil Dutt
    [J]. Journal of Signal Processing Systems, 2021, 93 : 1139 - 1148
  • [36] Performance Analysis of Number Theoretic Transform for Lattice-Based Cryptography
    Mohsen, Ayman W.
    Sobh, Mohamed A.
    Bahaa-Eldin, Ayman M.
    [J]. PROCEEDINGS OF 2018 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2018, : 442 - 447
  • [37] Portable Implementation of Lattice-based Cryptography using Java']JavaScript
    Yuan, Ye
    Cheng, Chen-Mou
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    Takagi, Tsuyoshi
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 58 - 67
  • [38] Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based Cryptography
    Chen Z.
    Ma Y.
    Jing J.
    [J]. Ma, Yuan (mayuan@iie.ac.cn), 2021, Peking University (57): : 595 - 604
  • [39] Towards Efficient Discrete Gaussian Sampling for Lattice-Based Cryptography
    Du, Chaohui
    Bai, Guoqiang
    [J]. 2015 25TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2015,
  • [40] Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography
    Nejatollahi, Hamid
    Shahhosseini, Sina
    Cammarota, Rosario
    Dutt, Nikil
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (10): : 1139 - 1148