Tosun, Tolun and Oswald, Elisabeth and Savaş, Erkay (2025) Non-profiled higher-order side-channel attacks against lattice-based post-quantum cryptography. IACR Communications in Cryptology, 2 (3). ISSN 3006-5496
Full text not available from this repository. (Request a copy)
Official URL: http://dx.doi.org/10.62056/a0txl8n4e
Abstract
In this work, we present methods for conducting higher-order non-profiled side-channel attacks on Lattice-Based Cryptography (LBC). Our analysis covers two scenarios: one where the device leakage is known and follows Hamming weight model, and another where the leakage model is not Hamming weight based and unknown to the attacker. We focus on the Post-Quantum Cryptography (PQC) standards, the Dilithium digital signature (i.e. ML-DSA) and the Kyber key encapsulation (i.e. ML-KEM) algorithms. For Hamming weight leakage, we develop efficient higher-order Correlation Power Analysis (HOCPA) attacks in which the attacker must compute a function known as the optimal prediction function. We revisit the definition of optimal prediction function and introduce a recursive method for computing it efficiently. Our approach is particularly useful when a closed-form formula is unavailable, as in LBC. Then, we introduce sin and cos prediction functions, which prove optimal for HOCPA attacks against second and higher-order masking protection. We validate our methods through simulations and real-device experiments on open-source masked implementations of Dilithium and Kyber on an Arm Cortex-M4. On the real device, we achieve full secret-key recovery using only 700 and 2400 traces for second and third-order masked implementations of Dilithium, and 2200 and 14500 traces for second and third-order masked implementations of Kyber, respectively. For the unknown leakage scenarios, we leverage generic Side-Channel Analysis (SCA) distinguishers. A key challenge here is the injectivity of modular multiplications in NTT based polynomial multiplication, typically addressed by bit-dropping in the literature. However, we experimentally show that bit-dropping is largely inefficient against protected implementations of LBC. To overcome this limitation, we present a novel two-step attack to Kyber, combining generic distinguishers and lattice reduction techniques. Our approach decreases the number of predictions from q^2 to q and does not rely on bit-dropping. Our experimental results demonstrate a speed-up of up to 23490x in attack run-time over the baseline along with improved success rate. In certain scenarios, higher-order attacks become feasible only through the proposed approach, as classical methods are shown to be unsuccessful.
| Item Type: | Article |
|---|---|
| Uncontrolled Keywords: | Higher-Order Side-Channel Analysis · Correlation Power Analysis · Kyber · Dilithium · Masking · Kruskal-Wallis Test |
| Divisions: | Faculty of Engineering and Natural Sciences |
| Depositing User: | Erkay Savaş |
| Date Deposited: | 31 Mar 2026 10:17 |
| Last Modified: | 31 Mar 2026 10:17 |
| URI: | https://research.sabanciuniv.edu/id/eprint/53893 |

