Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks

被引:31
|
作者
Bindel, Nina [1 ]
Buchmann, Johannes [1 ]
Kraemer, Juliane [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
关键词
lattice-based cryptography; signature scheme; fault attack; side channel analysis; LWE;
D O I
10.1109/FDTC.2016.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to their high efficiency and their strong security properties, lattice-based cryptographic schemes seem to be a very promising post-quantum replacement for currently used public key cryptography. The security of lattice-based schemes has been deeply analyzed mathematically, whereas little effort has been spent on the analysis against implementation attacks. In this paper, we start with the fault analysis of one of the most important cryptographic primitives: signature schemes. We investigate the vulnerability and resistance of the currently most efficient lattice-based signature schemes BLISS (CRYPTO 2013), ring-TESLA (AfricaCrypt 2016), and the GLP scheme (CHES 2012) and their implementations. We consider different kinds of (first-order) randomizing, zeroing, and skipping faults. For each of the signature schemes, we found at least six effective attacks. To increase the security of lattice-based signature schemes, we propose countermeasures for each of the respective attacks.
引用
收藏
页码:63 / 77
页数:15
相关论文
共 50 条
  • [31] A survey on lattice-based digital signature
    Fengxia Liu
    Zhiyong Zheng
    Zixian Gong
    Kun Tian
    Yi Zhang
    Zhe Hu
    Jia Li
    Qun Xu
    Cybersecurity, 7
  • [32] Lattice-based undeniable signature scheme
    Swati Rawal
    Sahadeo Padhye
    Debiao He
    Annals of Telecommunications, 2022, 77 : 119 - 126
  • [33] Lattice-Based Non-interactive Blind Signature Schemes in the Random Oracle Model
    Zhang, Haoqi
    Chen, Xinjian
    Huang, Qiong
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT I, 2025, 14903 : 289 - 308
  • [34] Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols
    Espitau, Thomas
    Fouque, Pierre-Alain
    Gerard, Benoit
    Tibouchi, Mehdi
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (11) : 1535 - 1549
  • [35] A Note on Fault Attacks Against Deterministic Signature Schemes
    Barenghi, Alessandro
    Pelosi, Gerardo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 182 - 192
  • [36] Attacking Deterministic Signature Schemes Using Fault Attacks
    Poddebniak, Damian
    Somorovsky, Juraj
    Schinzel, Sebastian
    Lochter, Manfred
    Roslert, Paul
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 338 - 352
  • [37] Power Analysis Attacks for Lattice-Based Cryptography
    Li Y.-B.
    Zhu J.-J.
    Tang M.
    Zhang H.-G.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 331 - 352
  • [38] Broadcast Attacks against Lattice-Based Cryptosystems
    Plantard, Thomas
    Susilo, Willy
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 456 - 472
  • [39] NSS: An NTRU lattice-based Signature Scheme
    Hoffstein, J
    Pipher, J
    Silverman, JH
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 211 - 228
  • [40] Resilience of lattice-based Cryptosystems to Quantum Attacks
    Koeppl, Tobias
    Zander, Rene
    Tcholtchev, Nikolay
    2024 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, ISCC 2024, 2024,