Correction Fault Attacks on Randomized CRYSTALS-Dilithium

被引:0
|
作者
Krahmer, Elisabeth [1 ,2 ]
Pessl, Peter [2 ]
Land, Georg [1 ]
Güneysu, Tim [1 ,3 ]
机构
[1] Ruhr-University Bochum, Bochum, Germany
[2] Infineon Technologies AG, Munich, Germany
[3] DFKI GmbH, Bremen, Germany
关键词
Side channel attack;
D O I
10.46586/tches.v2024.i3.174-199
中图分类号
学科分类号
摘要
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices. Concretely, there are still many open questions regarding the susceptibility of Dilithium to fault attacks. This is especially the case for Dilithium’s randomized (or hedged) signing mode, which, likely due to devastating implementation attacks on the deterministic mode, was selected as the default by NIST. This work takes steps towards closing this gap by presenting two new key-recovery fault attacks on randomized/hedged Dilithium. Both attacks are based on the idea of correcting faulty signatures after signing. A successful correction yields the value of a secret intermediate that carries information on the key. After gathering many faulty signatures and corresponding correction values, it is possible to solve for the signing key via either simple linear algebra or lattice-reduction techniques. Our first attack extends a previously published attack based on an instruction-skipping fault to the randomized setting. Our second attack injects faults in the matrix A, which is part of the public key. As such, it is not sensitive to side-channel leakage and has, potentially for this reason, not seen prior analysis regarding faults. We show that for Dilithium2, the attacks allow key recovery with as little as 1024 and 512 faulty signatures, with each signature generated by injecting a single targeted fault. We also demonstrate how our attacks can be adapted to circumvent several popular fault countermeasures with a moderate increase in the computational runtime and the number of required faulty signatures. These results are verified using both simulated faults and clock glitches on an ARM-based standard microcontroller. The presented attacks demonstrate that also randomized Dilithium can be subject to diverse fault attacks, that certain countermeasures might be easily bypassed, and that potential fault targets reach beyond side-channel sensitive operations. Still, many further operations are likely also susceptible, implying the need for increased analysis efforts in the future. © 2024, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:174 / 199
相关论文
共 50 条
  • [1] Theoretical Approach to Backdoor Attacks on the Template of CRYSTALS-Dilithium
    Perez-Ramos, Edgar
    Caballero-Gil, Pino
    2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, : 1797 - 1802
  • [2] Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages
    Qiao, Zehua
    Liu, Yuejun
    Zhou, Yongbin
    Ming, Jingdian
    Jin, Chengbin
    Li, Huizhong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1 - 14
  • [3] Crystals-Dilithium on ARMv8
    Kim, Youngbeom
    Song, Jingyo
    Youn, Taek-Young
    Seo, Seog Chung
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [4] In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
    Wang, Huaxin
    Gao, Yiwen
    Liu, Yuejun
    Zhang, Qian
    Zhou, Yongbin
    CYBERSECURITY, 2024, 7 (01):
  • [5] Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium
    Bronchain, Olivier
    Azouaoui, Melissa
    Elghamrawy, Mohamed
    Renes, Joost
    Schneider, Tobias
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 359 - 383
  • [6] Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium
    Lee, Jonghyeok
    Han, Jaeseung
    Lee, Sangyub
    Kwon, Jihoon
    Choi, Keon-Hee
    Huh, Jae-Won
    Cho, Jihoon
    Han, Dong-Guk
    IEEE ACCESS, 2023, 11 : 142862 - 142873
  • [7] Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
    Ricci, Sara
    Malina, Lukas
    Jedlicka, Petr
    Smekal, David
    Hajny, Jan
    Cibik, Peter
    Dzurenda, Petr
    Dobias, Patrik
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [8] CRYSTALS-Dilithium算法实现的空间优化
    敖思凡
    王后珍
    白鹭
    文嘉明
    张焕国
    武汉大学学报(理学版), 2023, 69 (06) : 709 - 718
  • [9] An Efficient Unified Polynomial Arithmetic Unit for CRYSTALS-Dilithium
    Pham, Thang Xuan
    Duong-Ngoc, Phap
    Lee, Hanho
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (12) : 4854 - 4864
  • [10] High-Performance Hardware Implementation of CRYSTALS-Dilithium
    Beckwith, Luke
    Duc Tri Nguyen
    Gaj, Kris
    2021 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT), 2021, : 250 - 259