We would like to share our recent work titled "Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results" available at
https://eprint.iacr.org/2022/737
Please find a short abstract of our work below:
In this work, we present a systematic study of Side-Channel Attacks (SCA) and Fault Injection Attacks (FIA) on structured lattice-based schemes, with focus on Kyber Key Encapsulation Mechanism (KEM)
and Dilithium signature scheme. We attempt to present a survey and classification of existing SCA/FIA on Kyber and Dilithium. Given the wide variety of reported attacks, simultaneous protection against all the attacks requires implementing customized protections/countermeasures
for both Kyber and Dilithium. We therefore present a range of customized countermeasures, capable of providing defenses/mitigations against existing SCA/FIA. We implement the presented countermeasures within two well-known public software libraries for PQC
- (1) pqm4 library for the ARM Cortex-M4 based microcontroller and (2)
liboqs library for the Raspberry Pi 3 Model B Plus based on the ARM Cortex-A53 processor. Our performance evaluation reveals that the presented custom countermeasures incur reasonable performance overheads, on both the evaluated embedded platforms. We therefore
believe our work argues for usage of custom countermeasures within real-world implementations of lattice-based schemes, either in a standalone manner, or as reinforcements to generic countermeasures such as masking.
DETECTION-BASED COUNTERMEASURES
(SANITY CHECK) AGAINST SCA/FIA ASSISTED CHOSEN-CIPHERTEXT ATTACKS:
We would like to particularly highlight two detection-based countermeasures against SCA/FIA assisted chosen-ciphertext attacks on LWE/LWR-based KEMs, that are discussed in this work. The core idea
is to detect a malicious ciphertext and immediately refresh the long-term secret key to prevent further exposure. The first countermeasure is the ciphertext sanity check (Section 5.1.1) which filters low entropy ciphertexts (also proposed in [1]), and the
second countermeasure is the message polynomial sanity check countermeasure which can detect malicious ciphertexts that work based on border-failure strategies. The recent talk titled "Surviving the FO-Calypse" by
Azouaoui et al. [2] highlighted the difficulty of detecting ciphertexts that work based on border-failure strategies. In this respect, we believe our proposed message polynomial
sanity check countermeasure could be an interesting low-cost approach to thwart most if not all the proposed SCA/FIA assisted chosen-ciphertext attacks.
We appreciate any feedback/suggestions/discussions from the community in this topic.
With Thanks and Regards,
The Team.
References:
[1] Xu, Zhuang, Owen Michael Pemberton, Sujoy Sinha Roy, David Oswald, Wang Yao, and Zhiming Zheng. "Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case
study of kyber." IEEE Transactions on Computers (2021).
[2] Surviving the FO-Calypse: Securing PQC Implementations in Practice, Melissa Azouaoui, Joppe W. Bos, Björn Fay, Marc Gourjon, Yulia Kuzovkova, Joost Renes, Tobias Schneider, Christine van Vredendaal
in Collaboration with UCLouvain: Olivier Bronchain, Clément Hoffmann, François-Xavier Standaert,
Real World Crypto Symposium, April 2022, Available at https://iacr.org/submit/files/slides/2022/rwc/rwc2022/48/slides.pdf
CONFIDENTIALITY: This email is intended solely for the person(s) named and may be confidential and/or privileged. If you are not the intended recipient, please delete it, notify us and do not copy,
use, or disclose its contents.
Towards a sustainable earth: Print only when necessary. Thank you.