A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber

被引:2
作者
Xu, Dejun [1 ]
Wang, Kai [1 ]
Tian, Jing [1 ]
机构
[1] Nanjing Univ, Sch Integrated Circuits, Suzhou 215163, Peoples R China
关键词
Hardware; Cryptography; Computer architecture; Circuits; Indexes; Circuit faults; Side-channel attacks; Pulse width modulation; Polynomials; Software; CRYSTALS-Kyber; hardware implementation; shuffling; side-channel attack; countermeasure;
D O I
10.1109/TCSII.2025.3528751
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
CRYSTALS-Kyber has been standardized as the only key-encapsulation mechanism (KEM) scheme by NIST to withstand attacks by large-scale quantum computers. However, the side-channel attacks (SCAs) on its implementation are still needed to be well considered for the upcoming migration. In this brief, we propose a secure and efficient hardware implementation for Kyber by incorporating a novel compact shuffling architecture. First of all, we modify the Fisher-Yates shuffle to make it more hardware-friendly. We then design an optimized shuffling architecture for the well-known open-source Kyber hardware implementation to enhance the security of all known and potential side-channel leakage points. Finally, we implement the modified Kyber design on FPGA and evaluate its security and performance. The security is verified by conducting correlation power analysis (CPA) and test vector leakage assessment (TVLA) on the hardware. Meanwhile, FPGA place-and-route results show that the proposed design reports only 8.7% degradation on the hardware efficiency compared with the original unprotected version, much better than existing hardware hiding schemes.
引用
收藏
页码:504 / 508
页数:5
相关论文
共 17 条
[1]  
Alagic G., 2022, document NIST IR 8413
[2]   An Architecture-Independent Instruction Shuffler to Protect against Side-Channel Attacks [J].
Bayrak, Ali Galip ;
Velickovic, Nikola ;
Ienne, Paolo ;
Burleson, Wayne .
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2012, 8 (04)
[3]   Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for NTT-Based Post-Quantum Cryptography [J].
Chen, Zhaohui ;
Ma, Yuan ;
Jing, Jiwu .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (01) :322-326
[4]  
Hamburg M., 2021, IACR Transactions on Cryptographic Hardware and Embedded Systems, V4, P88
[5]   A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection [J].
Jati, Arpan ;
Gupta, Naina ;
Chattopadhyay, Anupam ;
Sanadhya, Somitra Kumar .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)
[6]  
Kamucheka T, 2022, 2022 21ST INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT 2022), P112, DOI 10.1109/ICFPT56656.2022.9974404
[7]   A Configurable ML-KEM/Kyber Key-Encapsulation Hardware Accelerator Architecture [J].
Kim, Hyunseon ;
Jung, Haesung ;
Satriawan, Ardianto ;
Lee, Hanho .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (11) :4678-4682
[8]   Reconfigurable and High-Efficiency Polynomial Multiplication Accelerator for CRYSTALS-Kyber [J].
Li, Minghao ;
Tian, Jing ;
Hu, Xiao ;
Wang, Zhongfeng .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (08) :2540-2551
[9]   Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization [J].
Moraitis, Michail ;
Ji, Yanning ;
Brisfors, Martin ;
Dubrova, Elena ;
Lindskog, Niklas ;
Englund, Hakan .
IEEE DESIGN & TEST, 2024, 41 (05) :7-16
[10]   Bitstream Fault Injection Attacks on CRYSTALS Kyber Implementations on FPGAs [J].
Ni, Ziying ;
Khalid, Ayesha ;
Liu, Weiqiang ;
O'Neill, Make .
2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,