SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes

被引:1
|
作者
Guo, Qian [1 ]
Nabokov, Denis [1 ]
Nilsson, Alexander [1 ,2 ]
Johansson, Thomas [1 ]
机构
[1] Lund Univ, Dept Elect & Informat Technol, Lund, Sweden
[2] Advenica AB, Malmo, Sweden
基金
瑞典研究理事会;
关键词
Lattice-based cryptography; code-based cryptography; side-channel attacks; NIST post-quantum cryptography standardization; low-density parity-check codes;
D O I
10.1007/978-981-99-8730-6_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Whereas theoretical attacks on standardized cryptographic primitives rarely lead to actual practical attacks, the situation is different for side-channel attacks. Improvements in the performance of side-channel attacks are of utmost importance. In this paper, we propose a framework to be used in key-recovery side-channel attacks on CCA-secure post-quantum encryption schemes. The basic idea is to construct chosen ciphertext queries to a plaintext checking oracle that collects information on a set of secret variables in a single query. Then a large number of such queries is considered, each related to a different set of secret variables, and they are modeled as a low-density parity-check code (LDPC code). Secret variables are finally determined through efficient iterative decoding methods, such as belief propagation, using soft information. The utilization of LDPC codes offers efficient decoding, source coding, and error correction benefits. It has been demonstrated that this approach provides significant improvements compared to previous work by reducing the required number of queries, such as the number of traces in a power attack. The framework is demonstrated and implemented in two different cases. On one hand, we attack implementations of HQC in a timing attack, lowering the number of required traces considerably compared to attacks in previous work. On the other hand, we describe and implement a full attack on a masked implementation of Kyber using power analysis. Using the ChipWhisperer evaluation platform, our real-world attacks recover the long-term secret key of a first-order masked implementation of Kyber-768 with an average of only 12 power traces.
引用
收藏
页码:203 / 236
页数:34
相关论文
共 23 条
  • [1] Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks
    Santoso, Bagus
    Oohama, Yasutada
    Su, Chunhua
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 3 - 17
  • [2] Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems
    Seck, Boly
    Cayrel, Pierre-Louis
    Diop, Idy
    Dragoi, Vlad-Florin
    Couzon, Kalen
    Colombier, Brice
    Grosso, Vincent
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 219 - 234
  • [3] Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
    Azouaoui M.
    Kuzovkova Y.
    Schneider T.
    van Vredendaal C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 372 - 396
  • [4] Code-Based Schemes for Post-Quantum Digital Signatures
    Kuznetsov, Alexandr
    Kiian, Anastasiia
    Pushkar'ov, Andriy
    Mialkovskyi, Danylo
    Smirnov, Oleksii
    Kuznetsova, Tetiana
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 707 - 712
  • [5] Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography
    Wu W.-B.
    Liu Z.
    Yang H.
    Zhang J.-P.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (04): : 1165 - 1185
  • [6] Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures
    Shaller, Ari
    Zamir, Linir
    Nojoumian, Mehrdad
    INFORMATION AND COMPUTATION, 2023, 295
  • [7] A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
    Standaert, Francois-Xavier
    Malkin, Tal G.
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 443 - +
  • [8] Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks
    Barbu, Guillaume
    Battistello, Alberto
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 153 - 168
  • [9] WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography
    Saarinen, Markku-Juhani O.
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 637 - 657
  • [10] Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange Protocols
    Aysu, Aydin
    Tobah, Youssef
    Tiwari, Mohit
    Gerstlauer, Andreas
    Orshansky, Michael
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 81 - 88