Fault attacks on cca-secure lattice kems

被引:4
|
作者
Pessl P. [1 ]
Prokop L. [2 ]
机构
[1] Pessl, Peter
[2] Prokop, Lukas
来源
| 1600年 / Ruhr-University of Bochum卷 / 2021期
关键词
Fault attack; Key encapsulation; Lattice-based cryptography;
D O I
10.46586/tches.v2021.i2.37-60
中图分类号
学科分类号
摘要
NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process and enable appropriately secure wider deployment after standardization. However, lattice-based key-encapsulation mechanisms (KEMs), which are prominently represented among the finalists, have thus far received little attention when it comes to fault attacks. Interestingly, many of these KEMs exhibit structural similarities. They can be seen as variants of the encryption scheme of Lyubashevsky, Peikert, and Rosen, and employ the Fujisaki-Okamoto transform (FO) to achieve CCA2 security. The latter involves re-encrypting a decrypted plaintext and testing the ciphertexts for equivalence. This corresponds to the classic countermeasure of computing the inverse operation and hence prevents many fault attacks. In this work, we show that despite this inherent protection, practical fault attacks are still possible. We present an attack that requires a single instruction-skipping fault in the decoding process, which is run as part of the decapsulation. After observing if this fault actually changed the outcome (effective fault) or if the correct result is still returned (ineffective fault), we can set up a linear inequality involving the key coefficients. After gathering enough of these inequalities by faulting many decapsulations, we can solve for the key using a bespoke statistical solving approach. As our attack only requires distinguishing effective from ineffective faults, various detection-based countermeasures, including many forms of double execution, can be bypassed. We apply this attack to Kyber and NewHope, both of which belong to the aforementioned class of schemes. Using fault simulations, we show that, e.g., 6,500 faulty decapsulations are required for full key recovery on Kyber512. To demonstrate practicality, we use clock glitches to attack Kyber running on a Cortex M4. As we argue that other schemes of this class, such as Saber, might also be susceptible, the presented attack clearly shows that one cannot rely on the FO transform’s fault deterrence and that proper countermeasures are still needed. © 2021, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:37 / 60
页数:23
相关论文
共 50 条
  • [1] Generic side-channel attacks on cca-secure lattice-based pke and kems
    Ravi P.
    Roy S.S.
    Chattopadhyay A.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 307 - 335
  • [2] Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length
    Yamakawa, Takashi
    Yamada, Shota
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Kunihiro, Noboru
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 100 - 109
  • [3] CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
    Bos, Joppe
    Ducas, Leo
    Kiltz, Eike
    Lepoint, Tancrede
    Lyubashevsky, Vadim
    Schanck, John M.
    Schwabe, Peter
    Seiler, Gregor
    Stehle, Damien
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 353 - 367
  • [4] Quantum CCA-Secure PKE, Revisited
    Alamati, Navid
    Maram, Varun
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 193 - 226
  • [5] Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
    Renteria-Mejia, Claudia P.
    Velasco-Medina, Jaime
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) : 2331 - 2344
  • [6] A CCA-secure Verifiable Mix-net
    Li, Long-Hai
    Huang, Cheng-Qiang
    Fu, Shao-Feng
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 239 - 245
  • [7] Tightly CCA-Secure Encryption Without Pairings
    Gay, Romain
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 1 - 27
  • [8] A generic construction of CCA-secure deterministic encryption
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Wang, Xin
    Zhou, Yanwei
    Xia, Zhe
    INFORMATION PROCESSING LETTERS, 2020, 154 (154)
  • [9] RCCA security for KEM plus DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions
    Chen Yuan
    Dong Qingkuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1219 - 1231
  • [10] A Proposed CCA-secure Encryption on an ElGamal Variant
    Asbullah, M. A.
    Ariffin, M. R. K.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 499 - 503