Will You Cross the Skies Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs

被引:0
|
作者
Ravi P. [1 ,2 ]
Ezerman M.F. [3 ]
Bhasin S. [1 ]
Chattopadhyay A. [1 ,2 ]
Roy S.S. [4 ]
机构
[1] Temasek Laboratories, Nanyang Technological University
[2] School of Computer Science and Engineering, Nanyang Technological University
[3] School of Physical and Mathematical Sciences, Nanyang Technological University
[4] Institute of Applied Information Processing and Communications, TU Graz, Graz
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2021年 / 2022卷 / 01期
关键词
chosen ciphertext attack; electromagnetic-based side-channel attack; key encapsulation mechanism; lattice-based cryptography; learning with error; learning with rounding; public key encryption;
D O I
10.46586/tches.v2022.i1.722-761
中图分类号
学科分类号
摘要
In this work, we propose generic and novel side-channel assisted chosenciphertext attacks on NTRU-based key encapsulation mechanisms (KEMs). These KEMs are IND-CCA secure, that is, they are secure in the chosen-ciphertext model. Our attacks involve the construction of malformed ciphertexts. When decapsulated by the target device, these ciphertexts ensure that a targeted intermediate variable becomes very closely related to the secret key. An attacker, who can obtain information about the secret-dependent variable through side-channels, can subsequently recover the full secret key. We propose several novel CCAs which can be carried through by using side-channel leakage from the decapsulation procedure. The attacks instantiate three different types of oracles, namely a plaintext-checking oracle, a decryptionfailure oracle, and a full-decryption oracle, and are applicable to two NTRU-based schemes, which are NTRU and NTRU Prime. The two schemes are candidates in the ongoing NIST standardization process for post-quantum cryptography. We perform experimental validation of the attacks on optimized and unprotected implementations of NTRU-based schemes, taken from the open-source pqm4 library, using the EM-based side-channel on the 32-bit ARM Cortex-M4 microcontroller. All of our proposed attacks are capable of recovering the full secret key in only a few thousand chosen ciphertext queries on all parameter sets of NTRU and NTRU Prime. Our attacks, therefore, stress on the need for concrete side-channel protection strategies for NTRUbased KEMs. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:722 / 761
页数:39
相关论文
共 4 条
  • [1] Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU
    Xu, Zhuang
    Pemberton, Owen
    Oswald, David
    Zheng, Zhiming
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2022, 2023, 13820 : 227 - 247
  • [2] Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
    Azouaoui M.
    Kuzovkova Y.
    Schneider T.
    van Vredendaal C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 372 - 396
  • [3] Generic side-channel attacks on cca-secure lattice-based pke and kems
    Ravi P.
    Roy S.S.
    Chattopadhyay A.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 307 - 335
  • [4] Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs-Parallel PC Oracle Attacks on Kyber KEM and Beyond
    Rajendran G.
    Ravi P.
    D’anvers J.-P.
    Bhasin S.
    Chattopadhyay A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 418 - 446