Generic side-channel attacks on cca-secure lattice-based pke and kems

被引:0
|
作者
Ravi P. [1 ,2 ]
Roy S.S. [3 ]
Chattopadhyay A. [1 ,2 ]
Bhasin S. [1 ]
机构
[1] Temasek Laboratories, Nanyang Technological University
[2] School of Computer Science and Engineering, Nanyang Technological University
[3] School of Computer Science, University of Birmingham
关键词
Chosen Ciphertext Attack; EM-based side-channel attack; Key Encapsulation Mechanism; Lattice-based cryptography; LWE/LWR; Public Key Encryption;
D O I
10.13154/tches.v2020.i3.307-335
中图分类号
学科分类号
摘要
In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEM) secure in the chosen ciphertext model (IND-CCA security). We show that the EM side-channel information can be efficiently utilized to instantiate a plaintext checking oracle, which provides binary information about the output of decryption, typically concealed within IND-CCA secure PKE/KEMs, thereby enabling our attacks. Firstly, we identified EM-based side-channel vulnerabilities in the error correcting codes (ECC) enabling us to dis-tinguish based on the value/ validity of decrypted codewords. We also identified similar vulnerabilities in the Fujisaki-Okamoto transform which leaks information about decrypted messages applicable to schemes that do not use ECC. We subse-quently exploit these vulnerabilities to demonstrate practical attacks applicable to six CCA-secure lattice-based PKE/KEMs competing in the second round of the NIST standardization process. We perform experimental validation of our attacks on implementations taken from the open-source pqm4 library, running on the ARM Cortex-M4 microcontroller. Our attacks lead to complete key-recovery in a matter of minutes on all the targeted schemes, thus showing the effectiveness of our attack. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:307 / 335
页数:28
相关论文
共 50 条
  • [21] A Power Side-channel Attack Framework for Lattice-based Post Quantum Cryptography
    Hu W.
    Yuan C.
    Zheng J.
    Wang X.
    Li B.
    Tang S.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3210 - 3217
  • [22] CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
    Bos, Joppe
    Ducas, Leo
    Kiltz, Eike
    Lepoint, Tancrede
    Lyubashevsky, Vadim
    Schanck, John M.
    Schwabe, Peter
    Seiler, Gregor
    Stehle, Damien
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 353 - 367
  • [23] Side-Channel Attacks on BLISS Lattice-Based Signatures Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers
    Espitau, Thomas
    Fouque, Pierre-Alain
    Gerard, Benoit
    Tibouchi, Mehdi
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1857 - 1874
  • [24] Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
    Ravi, Prasanna
    Bhasin, Shivam
    Chattopadhyay, Anupam
    Aikata, Aikata
    Roy, Sujoy Sinha
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 216 - 221
  • [25] A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test
    Asano, Kyoichi
    Emura, Keita
    Takayasu, Atsushi
    Watanabe, Yohei
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 3 - 19
  • [26] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
  • [27] SecDir: A Secure Directory to Defeat Directory Side-Channel Attacks
    Yan, Mengjia
    Wen, Jen-Yang
    Fletcher, Christopher W.
    Torrellas, Josep
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 332 - 345
  • [28] How secure is your cache against side-channel attacks?
    He, Zecheng
    Lee, Ruby B.
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 341 - 353
  • [29] Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks
    Mi, Ruiqi
    Jiang, Haodong
    Zhang, Zhenfeng
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2023, 2024, 14201 : 255 - 274
  • [30] A Power Side-Channel Attack on the CCA2-Secure HQC KEM
    Schamberger, Thomas
    Renner, Julian
    Sigl, Georg
    Wachter-Zeh, Antonia
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2020, 2021, 12609 : 119 - 134