Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics

被引:2
|
作者
Bindel, Nina [1 ]
Buchmann, Johannes [1 ]
Kraemer, Juliane [1 ]
Mantel, Heiko [1 ]
Schickel, Johannes [1 ]
Weber, Alexandra [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany
关键词
D O I
10.1007/978-3-319-75650-9_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is expected to be resistant even against quantum adversaries. Due to a recent key recovery from a lattice-based implementation, it becomes clear that cache side channels are a serious threat for lattice-based implementations. In this article, we analyze an existing implementation of ring-TESLA against cache side channels. To reduce the effort for manual code inspection, we selectively employ automated program analysis. The leakage bounds we compute with program analysis are sound overapproximations of cache-side-channel leakage. We detect four cache-side-channel vulnerabilities in the implementation of ring-TESLA. Since two vulnerabilities occur in implementations of techniques common to lattice-based schemes, they are also interesting beyond ring-TESLA. Finally, we show how the detected vulnerabilities can be mitigated effectively.
引用
收藏
页码:225 / 241
页数:17
相关论文
共 50 条
  • [41] Practical provably-secure authenticated encryption schemes using lattice-based pseudorandom function SPRING
    Boorghany, A.
    Bayat-Sarmadi, S.
    Jalili, R.
    SCIENTIA IRANICA, 2018, 25 (06) : 3442 - 3460
  • [42] Cape: Compiler-Aided Program Transformation for HTM-Based Cache Side-Channel Defense
    Zhang, Rui
    Bond, Michael D.
    Zhang, Yinqian
    CC'22: PROCEEDINGS OF THE 31ST ACM SIGPLAN INTERNATIONAL CONFERENCE ON COMPILER CONSTRUCTION, 2022, : 181 - 193
  • [43] Side-Channel Attacks on BLISS Lattice-Based Signatures Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers
    Espitau, Thomas
    Fouque, Pierre-Alain
    Gerard, Benoit
    Tibouchi, Mehdi
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1857 - 1874
  • [44] Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs
    Yu, Tianrun
    Cheng, Chi
    Yang, Zilong
    Wang, Yingchen
    Pan, Yanbin
    Weng, Jian
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 200 - 223
  • [45] Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications
    Bagchi P.
    Bera B.
    Das A.K.
    Shetty S.
    Vijayakumar P.
    Karuppiah M.
    IEEE Internet of Things Magazine, 2023, 6 (01): : 52 - 58
  • [46] Detecting VMs Co-residency in the Cloud: Using Cache-based Side Channel Attacks
    Yu Si
    Gui Xiaolin
    Lin Jiancai
    Zhang Xuejun
    Wang Junfei
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19 (05) : 73 - 78
  • [47] Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications
    Bagchi, Prithwi
    Maheshwari, Raj
    Bera, Basudeb
    Das, Ashok Kumar
    Park, Youngho
    Lorenz, Pascal
    Yau, David K. Y.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (08) : 10393 - 10408
  • [48] Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber
    Ravi P.
    Paiva T.
    Jap D.
    D’anvers J.-P.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 795 - 818
  • [49] Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography
    Tosun, Tolun
    Savas, Erkay
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3353 - 3365
  • [50] Adaptive Detection Technique for Cache-Based Side Channel Attack Using Bloom Filter for Secure Cloud
    Chouhan, Munish
    Hasbullah, Halabi
    2016 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2016, : 293 - 297