Tosun, Tolun and Savaş, Erkay (2024) Zero-value filtering for accelerating non-profiled side-channel attack on incomplete NTT-based implementations of lattice-based cryptography. IEEE Transactions on Information Forensics and Security, 19 . pp. 3353-3365. ISSN 1556-6013 (Print) 1556-6021 (Online)
Full text not available from this repository. (Request a copy)
Official URL: https://dx.doi.org/10.1109/TIFS.2024.3359890
Abstract
Lattice-based cryptographic schemes such as Crystals-Kyber and Dilithium are post-quantum algorithms selected to be standardized by NIST as they are considered to be secure against quantum computing attacks. The multiplication in polynomial rings is the most time-consuming operation in many lattice-based cryptographic schemes, which is also subject to side-channel attacks. While NTT-based polynomial multiplication is almost a norm in a wide range of implementations, a relatively new method, incomplete NTT is preferred to accelerate lattice-based cryptography, especially on some computing platforms that feature special instructions. In this paper, we present a novel, efficient and non-profiled power/EM side-channel attack targeting polynomial multiplication based on the incomplete NTT algorithm. We apply the attack on the Crystals-Dilithium signature algorithm and Crystals-Kyber KEM. We demonstrate that the method accelerates attack run-time when compared to the existing approaches. While a conventional non-profiled side-channel attack tests a much larger hypothesis set because it needs to predict two coefficients of secret polynomials together, we propose a much faster <italic>zero-value filtering attack</italic> (ZV-FA), which reduces the size of the hypothesis set by targeting the coefficients individually. We also propose an effective and efficient validation and correction technique employing the inverse NTT to estimate and modify the mispredicted coefficients. Our experimental results show that we can achieve a speed-up of 1915×over brute-force.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Correlation; correlation power analysis; crsytals dilithium; crsytals kyber; Cryptography; Digital signatures; Filtering; multivariate mutual information analysis; post-quantum cryptography; Power demand; Quantum computing; side-channel attack; Side-channel attacks |
Divisions: | Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng. Faculty of Engineering and Natural Sciences |
Depositing User: | Erkay Savaş |
Date Deposited: | 08 Jun 2024 20:44 |
Last Modified: | 08 Jun 2024 20:44 |
URI: | https://research.sabanciuniv.edu/id/eprint/49123 |