Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics

被引:2
|
作者
Bindel, Nina [1 ]
Buchmann, Johannes [1 ]
Kraemer, Juliane [1 ]
Mantel, Heiko [1 ]
Schickel, Johannes [1 ]
Weber, Alexandra [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany
关键词
D O I
10.1007/978-3-319-75650-9_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is expected to be resistant even against quantum adversaries. Due to a recent key recovery from a lattice-based implementation, it becomes clear that cache side channels are a serious threat for lattice-based implementations. In this article, we analyze an existing implementation of ring-TESLA against cache side channels. To reduce the effort for manual code inspection, we selectively employ automated program analysis. The leakage bounds we compute with program analysis are sound overapproximations of cache-side-channel leakage. We detect four cache-side-channel vulnerabilities in the implementation of ring-TESLA. Since two vulnerabilities occur in implementations of techniques common to lattice-based schemes, they are also interesting beyond ring-TESLA. Finally, we show how the detected vulnerabilities can be mitigated effectively.
引用
收藏
页码:225 / 241
页数:17
相关论文
共 50 条
  • [1] Lattice-based blind signature schemes
    Wang, Fenghe
    Hu, Yupu
    Wang, Chunxiao
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 550 - 553
  • [2] Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature
    Fukushima, Kazuhide
    Okada, Hiroki
    Takarabt, Sofiane
    Korchi, Amina
    Hamoud, Meziane
    Karray, Khaled
    Souissy, Youssef
    Guilley, Sylvain
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 701 - 706
  • [3] Lattice-based message recovery signature schemes
    Tian, Miaomiao
    Huang, Liusheng
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 257 - 269
  • [4] Practical Lattice-Based Digital Signature Schemes
    Howe, James
    Poeppelmann, Thomas
    O'Neill, Maire
    O'Sullivan, Elizabeth
    Gueneysu, Tim
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2015, 14 (03)
  • [5] Lattice-based message recovery signature schemes
    Tian, M. (miaotian@mail.ustc.edu.cn), 1600, Inderscience Enterprises Ltd., Editorial Office, P O Box 735, Olney, Bucks., MK46 5WB, MK46 5WB, United Kingdom (05): : 3 - 4
  • [6] Lattice-based Multi-signature Schemes
    Kong, Fanyu
    Diao, Luhong
    Yu, Jia
    Jiang, Yali
    Zhou, Dashui
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 3 - +
  • [7] Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
    Bindel, Nina
    Buchmann, Johannes
    Kraemer, Juliane
    2016 WORKSHOP ON FAULT AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2016, : 63 - 77
  • [8] Evaluation of Lattice-Based Signature Schemes in Embedded Systems
    Gueneysu, Tim
    Krausz, Markus
    Oder, Tobias
    Speith, Julian
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2018, : 385 - 388
  • [9] A SELECTION OF RECENT LATTICE-BASED SIGNATURE AND ENCRYPTION SCHEMES
    El Bansarkhani, Rachid
    Cabarcas, Daniel
    Kuo, Po-Chun
    Schmidt, Patrick
    Schneider, Michael
    TATRACRYPT '12, 2012, 53 : 81 - 102
  • [10] Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes
    Shim, Kyung-Ah
    An, Youngjoo
    IEEE ACCESS, 2021, 9 : 134427 - 134434