Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium

被引:0
|
作者
Bronchain, Olivier [1 ]
Azouaoui, Melissa [1 ]
Elghamrawy, Mohamed [1 ]
Renes, Joost [1 ]
Schneider, Tobias [1 ]
机构
[1] NXP Semiconductors, Eindhoven, Netherlands
关键词
Belief propagation - Chromium compounds - Quantum cryptography;
D O I
10.46586/tches.v2024.i2.359-383
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full key recovery attack. The methodology is composed of two steps. The first step consists of observing or inserting a bias in the posterior distribution of sensitive variables. The second step is an information processing phase which is based on belief propagation and effectively exploits that bias. The proposed concrete attacks rely on side-channel information, induced faults or possibly a combination of the two. Interestingly, the adversary benefits most from this previous knowledge when targeting the released signatures, however, the latter are not strictly necessary. We show that the combination of a physical attack with the binary knowledge of acceptance or rejection of a signature also leads to exploitable information on the secret key. Finally, we demonstrate that this approach is also effective against shuffled implementations of CRYSTALS-Dilithium. © 2024, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:359 / 383
相关论文
共 10 条
  • [1] Correction Fault Attacks on Randomized CRYSTALS-Dilithium
    Krahmer, Elisabeth
    Pessl, Peter
    Land, Georg
    Güneysu, Tim
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 174 - 199
  • [2] Sparse Polynomial Multiplication-based High-Performance Hardware Implementation for CRYSTALS-Dilithium
    Zhao, Hang
    Zhao, Cankun
    Zhu, Wenping
    Yang, Bohan
    Wei, Shaojun
    Liu, Leibo
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 150 - 159
  • [3] Theoretical Approach to Backdoor Attacks on the Template of CRYSTALS-Dilithium
    Perez-Ramos, Edgar
    Caballero-Gil, Pino
    2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, : 1797 - 1802
  • [4] An Efficient Unified Polynomial Arithmetic Unit for CRYSTALS-Dilithium
    Pham, Thang Xuan
    Duong-Ngoc, Phap
    Lee, Hanho
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (12) : 4854 - 4864
  • [5] Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium
    Lee, Jonghyeok
    Han, Jaeseung
    Lee, Sangyub
    Kwon, Jihoon
    Choi, Keon-Hee
    Huh, Jae-Won
    Cho, Jihoon
    Han, Dong-Guk
    IEEE ACCESS, 2023, 11 : 142862 - 142873
  • [6] Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages
    Qiao, Zehua
    Liu, Yuejun
    Zhou, Yongbin
    Ming, Jingdian
    Jin, Chengbin
    Li, Huizhong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1 - 14
  • [7] A Low-Latency Polynomial Multiplier Accelerator for CRYSTALS-Dilithium Digital Signature
    Du, Gaoming
    Chen, Zhuo
    Li, Zhenmin
    Wang, Xiaolei
    Zhang, Duoli
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 258 - 262
  • [8] In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
    Wang, Huaxin
    Gao, Yiwen
    Liu, Yuejun
    Zhang, Qian
    Zhou, Yongbin
    CYBERSECURITY, 2024, 7 (01):
  • [9] KiD: A Hardware Design Framework Targeting Unified NTT Multiplication for CRYSTALS-Kyber and CRYSTALS-Dilithium on FPGA
    Mandal, Suraj
    Roy, Debapriya Basu
    PROCEEDINGS OF THE 37TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, VLSID 2024 AND 23RD INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, ES 2024, 2024, : 455 - 460
  • [10] Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation
    Zheng, Jieyu
    He, Feng
    Shen, Shiyu
    Xue, Chenxi
    Zhao, Yunlei
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 304 - 317