REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography

被引:0
|
作者
Pagliarini, Samuel [1 ,3 ]
Aikata, Aikata [2 ]
Imran, Malik [3 ,4 ]
Roy, Sujoy Sinha [2 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Graz Univ Technol, Graz, Austria
[3] Tallinn Univ Technol, Tallinn, Estonia
[4] Queens Univ Belfast, Belfast, Antrim, North Ireland
关键词
Reverse Engineering; Post-Quantum Cryptography; Hardware Trojan Horses; Backdoors; Hardware Accelerators; TROJAN;
D O I
10.1145/3634737.3657016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Significant research efforts have been dedicated to designing cryptographic algorithms that are quantum-resistant. The motivation is clear: robust quantum computers, once available, will render current cryptographic standards vulnerable. Thus, we need new Post-Quantum Cryptography (PQC) algorithms, and, due to the inherent complexity of such algorithms, there is also a demand to accelerate them in hardware. In this paper, we show that PQC hardware accelerators can be backdoored by two different adversaries located in the chip supply chain. We propose REPQC, a sophisticated reverse engineering algorithm that can be employed to confidently identify hashing operations (i.e., Keccak) within the PQC accelerator - the location of which serves as an anchor for finding secret information to be leaked. Armed with REPQC, an adversary proceeds to insert malicious logic in the form of a stealthy Hardware Trojan Horse (HTH). Using Dilithium as a study case, our results demonstrate that HTHs that increase the accelerator's layout density by as little as 0.1% can be inserted without any impact on the performance of the circuit and with a marginal increase in power consumption. An essential aspect is that the entire reverse engineering in REPQC is automated, and so is the HTH insertion that follows it, empowering adversaries to explore multiple HTH designs and identify the most suitable one.
引用
收藏
页码:533 / 547
页数:15
相关论文
共 50 条
  • [1] Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
    Ravi, Prasanna
    Bhasin, Shivam
    Chattopadhyay, Anupam
    Aikata, Aikata
    Roy, Sujoy Sinha
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 216 - 221
  • [2] Hardware Design and Implementation of Post-Quantum Cryptography Kyber
    Zeng, Qingru
    Li, Quanxin
    Zhao, Baoze
    Jiao, Han
    Huang, Yihua
    2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [3] Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
    Fritzmann T.
    Van Beirendonck M.
    Roy D.B.
    Karl P.
    Schamberger T.
    Verbauwhede I.
    Sigl G.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2022 (01): : 414 - 460
  • [4] FPGA Implementation of Compact Hardware Accelerators for Ring-Binary-LWE-based Post-quantum Cryptography
    He, Pengzhou
    Bao, Tianyou
    Xie, Jiafeng
    Amin, Moeness
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2023, 16 (03)
  • [5] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [6] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [7] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [8] Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads
    Koteshwara, Sandhya
    Kumar, Manoj
    Pattnaik, Pratap
    PROCEEDINGS OF THE 9TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2020, 2020,
  • [9] Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware
    Gaj, Kris
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 359 - 364
  • [10] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +