Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs-Parallel PC Oracle Attacks on Kyber KEM and Beyond

被引:0
|
作者
Rajendran G. [2 ]
Ravi P. [1 ,2 ]
D’anvers J.-P. [3 ]
Bhasin S. [1 ]
Chattopadhyay A. [1 ,2 ]
机构
[1] Temasek Laboratories, Nanyang Technological University
[2] School of Computer Science and Engineering, Nanyang Technological University
[3] imec-COSIC KU Leuven, Kasteelpark Arenberg 10-bus 2452, Leuven
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2023年 / 2023卷 / 02期
关键词
Chosen-Ciphertext Attack; Key Encapsulation Mechanism; Kyber; lattice-based cryptography; Plaintext-Checking Oracle; Side-Channel Analysis;
D O I
10.46586/tches.v2023.i2.418-446
中图分类号
学科分类号
摘要
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given target, as the attacker requires very minimal information about the target device. However, these attacks have an inherent disadvantage of requiring a few thousand traces to perform full key recovery. This is due to the fact that these attacks typically work by recovering a single bit of information about the secret key per query/trace. In this respect, we propose novel paral lel PC oracle based side-channel attacks, which are capable of recovering a generic P number of bits of information about the secret key in a single query/trace. We propose novel techniques to build chosen-ciphertexts so as to efficiently realize a parallel PC oracle for Kyber KEM. We also build a multi-class classifier, which is capable of realizing a practical side-channel based parallel PC oracle with very high success rate. We experimentally validated the proposed attacks (upto P = 10) on the fastest implementation of unprotected Kyber KEM in the pqm4 library. Our experiments yielded improvements in the range of 2.89× and 7.65× in the number of queries, compared to state-of-the-art binary PC oracle attacks, while arbitrarily higher improvements are possible for a motivated attacker, given the generic nature of the proposed attacks. We further conduct a thorough study on applicability to different scenarios, based on the presence/absence of a clone device, and also partial key recovery. Finally, we also show that the proposed attacks are able to achieve the lowest number of queries for key recovery, even for implementations protected with low-cost countermeasures such as shuffling. Our work therefore, concretely demonstrates the power of PC oracle attacks on Kyber KEM, thereby stressing the need for concrete countermeasures such as masking for Kyber and other lattice-based KEMs. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:418 / 446
页数:28
相关论文
共 9 条
  • [1] Invited Paper: Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM
    Ravi, Prasanna
    Jap, Dirmanto
    Bhasin, Shivam
    Chattopadhyay, Anupam
    2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2023,
  • [2] Generic side-channel attacks on cca-secure lattice-based pke and kems
    Ravi P.
    Roy S.S.
    Chattopadhyay A.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 307 - 335
  • [3] Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM
    Kundu S.
    Chowdhury S.
    Saha S.
    Karmakar A.
    Mukhopadhyay D.
    Verbauwhede I.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 844 - 869
  • [4] Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
    Bogdanov, Andrey
    Kizhvatov, Ilya
    IEEE TRANSACTIONS ON COMPUTERS, 2012, 61 (08) : 1153 - 1164
  • [5] Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber
    Chen, Peng
    Cheng, Chi
    Li, Jinnuo
    Zhu, Tianqing
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 151 - 167
  • [6] Will You Cross the Skies Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
    Ravi P.
    Ezerman M.F.
    Bhasin S.
    Chattopadhyay A.
    Roy S.S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2022 (01): : 722 - 761
  • [7] DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks
    Aydin, Furkan
    Kashyap, Priyank
    Potluri, Seetal
    Franzon, Paul
    Aysu, Aydin
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2020, 2020, 12471 : 262 - 280
  • [8] Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber
    Ravi P.
    Paiva T.
    Jap D.
    D’anvers J.-P.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 795 - 818
  • [9] Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results
    Ravi, Prasanna
    Chattopadhyay, Anupam
    D'Anvers, Jan Pieter
    Baksi, Anubhab
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)