Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks

被引:0
作者
Azouaoui M. [1 ]
Kuzovkova Y. [1 ]
Schneider T. [1 ]
van Vredendaal C. [1 ]
机构
[1] NXP Semiconductors, Hamburg
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2022年 / 2022卷 / 04期
关键词
Authenticated Key Exchange; Chosen-Ciphertext Attacks; Post-Quantum Cryptography; Side-Channel Attacks;
D O I
10.46586/tches.v2022.i4.372-396
中图分类号
学科分类号
摘要
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention. In particular, it has been shown that some post-quantum Key Encapsulation Mechanisms (KEMs) are vulnerable to Chosen-Ciphertext Side-Channel Attacks (CC-SCA). These powerful attacks target the re-encryption step in the Fujisaki-Okamoto (FO) transform, which is commonly used to achieve CCA security in such schemes. To sufficiently protect PQC KEMs on embedded devices against such a powerful CC-SCA, masking at increasingly higher order is required, which induces a considerable overhead. In this work, we propose to use a conceptually simple construction, the EtS KEM, that alleviates the impact of CC-SCA. It uses the Encrypt-then-Sign (EtS) paradigm introduced by Zheng at ISW ’97 and further analyzed by An, Dodis and Rabin at EUROCRYPT ’02, and instantiates a post-quantum authenticated KEM in the outsider-security model. While the construction is generic, we apply it to the CRYSTALS-Kyber KEM, relying on the CRYSTALS-Dilithium and Falcon signature schemes. We show that a CC-SCA-protected EtS KEM version of CRYSTALS-Kyber requires less than 10% of the cycles required for the CC-SCA-protected FO-based KEM, at the cost of additional data/communication overhead. We additionally show that the cost of protecting the EtS KEM against fault injection attacks, necessarily due to the added signature verification, remains negligible compared to the large cost of masking the FO transform at higher orders. Lastly, we discuss relevant embedded use cases for our EtS KEM construction. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:372 / 396
页数:24
相关论文
共 55 条
[1]  
Avanzi Roberto, Bos Joppe, Ducas Leo, Kiltz Eike, Lepoint Tancrede, Lyubashevsky Vadim, Schanck John M, Schwabe Peter, Seiler Gregor, Stehle Damien, Crystals-kyber algorithm specifications and supporting documentation, NIST PQC Round, 3, (2019)
[2]  
Azouaoui Melissa, Bronchain Olivier, Hoffmann Clement, Kuzovkova Yulia, Schneider Tobias, Standaert Francois-Xavier, Systematic study of decryp-tion and re-encryption leakage: the case of kyber, IACR Cryptol. ePrint Arch, (2022)
[3]  
An Jee Hea, Dodis Yevgeniy, Rabin Tal, On the security of joint signature and encryption, Advances in Cryptology-EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28-May 2, 2002, Proceedings, volume 2332 of Lecture Notes in Computer Science, pp. 83-107, (2002)
[4]  
Bellizia Davide, Bronchain Olivier, Cassiers Gaetan, Grosso Vincent, Guo Chun, Momin Charles, Pereira Olivier, Peters Thomas, Standaert Francois-Xavier, Mode-level vs. implementation-level physical security in symmetric cryptography-A practical guide through the leakage-resistance jungle, CRYPTO 2020, Part I, volume 12170 of LNCS, pp. 369-400, (2020)
[5]  
Bindel Nina, Buchmann Johannes, Kramer Juliane, Mantel Heiko, Schickel Johannes, Weber Alexandra, Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics, Foundations and Practice of Security-10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers, volume 10723 of Lecture Notes in Computer Science, pp. 225-241
[6]  
Barnes Richard, Bhargavan Karthikeyan, Lipp Benjamin, Wood Christopher A., Hybrid Public Key Encryption, (2022)
[7]  
Bronchain Olivier, Cassiers Gaetan, Bitslicing arithmetic/boolean masking conversions for fun and profit with application to lattice-based kems, (2022)
[8]  
Van Beirendonck Michiel, D'Anvers Jan-Pieter, Karmakar Angshuman, Balasch Josep, Verbauwhede Ingrid, A side-channel-resistant implementation of SABER, ACM J. Emerg. Technol. Comput. Syst, 17, 2, (2021)
[9]  
Brendel Jacqueline, Fiedler Rune, Gunther Felix, Janson Christian, Stebila Douglas, Post-quantum asynchronous deniable key exchange and the signal handshake, IACR Cryptol. ePrint Arch, (2021)
[10]  
Bos Joppe W., Gourjon Marc, Renes Joost, Schneider Tobias, van Vredendaal Christine, Masking kyber: First-and higher-order implementations, IACR Trans. Cryptogr. Hardw. Embed. Syst, 2021, 4, pp. 173-214, (2021)