Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics

被引:2
|
作者
Bindel, Nina [1 ]
Buchmann, Johannes [1 ]
Kraemer, Juliane [1 ]
Mantel, Heiko [1 ]
Schickel, Johannes [1 ]
Weber, Alexandra [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany
关键词
D O I
10.1007/978-3-319-75650-9_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is expected to be resistant even against quantum adversaries. Due to a recent key recovery from a lattice-based implementation, it becomes clear that cache side channels are a serious threat for lattice-based implementations. In this article, we analyze an existing implementation of ring-TESLA against cache side channels. To reduce the effort for manual code inspection, we selectively employ automated program analysis. The leakage bounds we compute with program analysis are sound overapproximations of cache-side-channel leakage. We detect four cache-side-channel vulnerabilities in the implementation of ring-TESLA. Since two vulnerabilities occur in implementations of techniques common to lattice-based schemes, they are also interesting beyond ring-TESLA. Finally, we show how the detected vulnerabilities can be mitigated effectively.
引用
收藏
页码:225 / 241
页数:17
相关论文
共 50 条
  • [21] Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography
    Ravi, Prasanna
    Chattopadhyay, Anupam
    Bhasin, Shivam
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 188 - 189
  • [22] Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
    Pessl, Peter
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 153 - 170
  • [23] Using Freivalds' Algorithm to Accelerate Lattice-Based Signature Verifications
    Sipasseuth, Arnaud
    Plantard, Thomas
    Susilo, Willy
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 401 - 412
  • [24] Lattice-Based Non-interactive Blind Signature Schemes in the Random Oracle Model
    Zhang, Haoqi
    Chen, Xinjian
    Huang, Qiong
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT I, 2025, 14903 : 289 - 308
  • [25] Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols
    Espitau, Thomas
    Fouque, Pierre-Alain
    Gerard, Benoit
    Tibouchi, Mehdi
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (11) : 1535 - 1549
  • [26] Combined interactive protocol for lattice-based group signature schemes with verifier-local revocation
    Perera, Maharage Nisansala Sevwandi
    Koshiba, Takeshi
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (05) : 662 - 673
  • [27] A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees
    Zhao, Yong
    Yang, Shaojun
    Wu, Wei
    Huang, Xinyi
    COMPUTER JOURNAL, 2023, 66 (12): : 2961 - 2973
  • [28] Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
    Primas, Robert
    Pessl, Peter
    Mangard, Stefan
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 513 - 533
  • [29] Zero-Knowledge Proof for Lattice-Based Group Signature Schemes with Verifier-Local Revocation
    Perera, Maharage Nisansala Sevwandi
    Koshiba, Takeshi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018, 2019, 22 : 772 - 782
  • [30] A Power Side-channel Attack Framework for Lattice-based Post Quantum Cryptography
    Hu W.
    Yuan C.
    Zheng J.
    Wang X.
    Li B.
    Tang S.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3210 - 3217