Correction Fault Attacks on Randomized CRYSTALS-Dilithium

被引:0
|
作者
Krahmer, Elisabeth [1 ,2 ]
Pessl, Peter [2 ]
Land, Georg [1 ]
Güneysu, Tim [1 ,3 ]
机构
[1] Ruhr-University Bochum, Bochum, Germany
[2] Infineon Technologies AG, Munich, Germany
[3] DFKI GmbH, Bremen, Germany
关键词
Side channel attack;
D O I
10.46586/tches.v2024.i3.174-199
中图分类号
学科分类号
摘要
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices. Concretely, there are still many open questions regarding the susceptibility of Dilithium to fault attacks. This is especially the case for Dilithium’s randomized (or hedged) signing mode, which, likely due to devastating implementation attacks on the deterministic mode, was selected as the default by NIST. This work takes steps towards closing this gap by presenting two new key-recovery fault attacks on randomized/hedged Dilithium. Both attacks are based on the idea of correcting faulty signatures after signing. A successful correction yields the value of a secret intermediate that carries information on the key. After gathering many faulty signatures and corresponding correction values, it is possible to solve for the signing key via either simple linear algebra or lattice-reduction techniques. Our first attack extends a previously published attack based on an instruction-skipping fault to the randomized setting. Our second attack injects faults in the matrix A, which is part of the public key. As such, it is not sensitive to side-channel leakage and has, potentially for this reason, not seen prior analysis regarding faults. We show that for Dilithium2, the attacks allow key recovery with as little as 1024 and 512 faulty signatures, with each signature generated by injecting a single targeted fault. We also demonstrate how our attacks can be adapted to circumvent several popular fault countermeasures with a moderate increase in the computational runtime and the number of required faulty signatures. These results are verified using both simulated faults and clock glitches on an ARM-based standard microcontroller. The presented attacks demonstrate that also randomized Dilithium can be subject to diverse fault attacks, that certain countermeasures might be easily bypassed, and that potential fault targets reach beyond side-channel sensitive operations. Still, many further operations are likely also susceptible, implying the need for increased analysis efforts in the future. © 2024, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:174 / 199
相关论文
共 50 条
  • [41] Bitstream Fault Injection Attacks on CRYSTALS Kyber Implementations on FPGAs
    Ni, Ziying
    Khalid, Ayesha
    Liu, Weiqiang
    O'Neill, Make
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [42] Signature Correction Attack on Dilithium Signature Scheme
    Islam, Saad
    Mus, Koksal
    Singh, Richa
    Schaumont, Patrick
    Sunar, Berk
    2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 647 - 663
  • [43] Forging DILITHIUM and FALCON Signatures by Single Fault Injection
    Bauer, Sven
    De Santis, Fabrizio
    2023 WORKSHOP ON FAULT DETECTION AND TOLERANCE IN CRYPTOGRAPHY, FDTC 2023, 2023, : 81 - 88
  • [44] A survey on fault attacks
    Giraud, C
    Thiebeauld, H
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 159 - 176
  • [45] Profiling Dilithium Digital Signature Traces for Correlation Differential Side Channel Attacks
    Fournaris, Apostolos P.
    Dimopoulos, Charis
    Koufopavlou, Odysseas
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2020, 2020, 12471 : 281 - 294
  • [46] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [47] Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results
    Ravi, Prasanna
    Chattopadhyay, Anupam
    D'Anvers, Jan Pieter
    Baksi, Anubhab
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)
  • [48] Introduction to fault attacks on smartcard
    Lemarechal, A
    11th IEEE International On-Line Testing Symposium, 2005, : 116 - 116
  • [49] Optical fault induction attacks
    Skorobogatov, SP
    Anderson, RJ
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 2 - 12
  • [50] Fault Attacks on Cryptographic Circuits
    Polian, Ilia
    2019 17TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2019,