Generic side-channel attacks on cca-secure lattice-based pke and kems

被引:0
|
作者
Ravi P. [1 ,2 ]
Roy S.S. [3 ]
Chattopadhyay A. [1 ,2 ]
Bhasin S. [1 ]
机构
[1] Temasek Laboratories, Nanyang Technological University
[2] School of Computer Science and Engineering, Nanyang Technological University
[3] School of Computer Science, University of Birmingham
关键词
Chosen Ciphertext Attack; EM-based side-channel attack; Key Encapsulation Mechanism; Lattice-based cryptography; LWE/LWR; Public Key Encryption;
D O I
10.13154/tches.v2020.i3.307-335
中图分类号
学科分类号
摘要
In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEM) secure in the chosen ciphertext model (IND-CCA security). We show that the EM side-channel information can be efficiently utilized to instantiate a plaintext checking oracle, which provides binary information about the output of decryption, typically concealed within IND-CCA secure PKE/KEMs, thereby enabling our attacks. Firstly, we identified EM-based side-channel vulnerabilities in the error correcting codes (ECC) enabling us to dis-tinguish based on the value/ validity of decrypted codewords. We also identified similar vulnerabilities in the Fujisaki-Okamoto transform which leaks information about decrypted messages applicable to schemes that do not use ECC. We subse-quently exploit these vulnerabilities to demonstrate practical attacks applicable to six CCA-secure lattice-based PKE/KEMs competing in the second round of the NIST standardization process. We perform experimental validation of our attacks on implementations taken from the open-source pqm4 library, running on the ARM Cortex-M4 microcontroller. Our attacks lead to complete key-recovery in a matter of minutes on all the targeted schemes, thus showing the effectiveness of our attack. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:307 / 335
页数:28
相关论文
共 50 条
  • [31] A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
    Qin, Yue
    Cheng, Chi
    Zhang, Xiaohan
    Pan, Yanbin
    Hu, Lei
    Ding, Jintai
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT IV, 2021, 13093 : 92 - 121
  • [32] Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks
    Kroeger, Trevor
    Cheng, Wei
    Guilley, Sylvain
    Danger, Jean-Luc
    Karimi, Nazhmeh
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1000 - 1005
  • [33] How to secure scan design against scan-based side-channel attacks?
    Zhou, Wei
    Cui, Aijiao
    Li, Huawei
    Qu, Gang
    2017 IEEE 26TH ASIAN TEST SYMPOSIUM (ATS), 2017, : 116 - 121
  • [34] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [35] Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
    Tanaka Y.
    Ueno R.
    Xagawa K.
    Ito A.
    Takahashi J.
    Homma N.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 473 - 503
  • [36] Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks
    Santoso, Bagus
    Oohama, Yasutada
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 305 - 309
  • [37] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16
  • [38] MEAS: memory encryption and authentication secure against side-channel attacks
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 137 - 158
  • [39] Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber
    Ravi P.
    Paiva T.
    Jap D.
    D’anvers J.-P.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 795 - 818
  • [40] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    JournalofSystemsEngineeringandElectronics, 2009, 20 (03) : 660 - 665