Timing Attacks on Error Correcting Codes in Post-Quantum Schemes

被引:28
作者
D'Anvers, Jan-Pieter [1 ]
Tiepelt, Marcel [2 ]
Vercauteren, Frederik [1 ]
Verbauwhede, Ingrid [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[2] Karlsruhe Inst Technol, Karlsruhe, Germany
来源
TIS'19: PROCEEDINGS OF ACM WORKSHOP ON THEORY OF IMPLEMENTATION SECURITY WORKSHOP | 2019年
基金
欧盟地平线“2020”;
关键词
Post-Quantum Cryptography; Lattice based Cryptography; Side-Channel Attack; Decryption Failures; Error Correcting Codes;
D O I
10.1145/3338467.3358948
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While error correcting codes (ECC) have the potential to significantly reduce the failure probability of post-quantum schemes, they add an extra ECC decoding step to the algorithm. Even though this additional step does not compute directly on the secret key, it is susceptible to side-channel attacks. We show that if no precaution is taken, it is possible to use timing information to distinguish between ciphertexts that result in an error before decoding and ciphertexts that do not contain errors, due to the variable execution time of the ECC decoding algorithm. We demonstrate that this information can be used to break the IND-CCA security of post-quantum secure schemes by presenting an attack on two round 1 candidates to the NIST Post-Quantum Standardization Process: the Ring-LWE scheme LAC and the Mersenne prime scheme Ramstake. This attack recovers the full secret key using a limited number of timed decryption queries and is implemented on the reference and the optimized implementations of both submissions. It is able to retrieve LAC's secret key for all security levels in under 2 minutes using less than 2(16) decryption queries and Ramstake's secret key in under 2 minutes using approximately 2400 decryption queries. The attack generalizes to other lattice-based schemes with ECC in which any side-channel information about the presence of errors is leaked during decoding.
引用
收藏
页码:2 / 9
页数:8
相关论文
共 36 条
  • [1] Aggarwal D., 2017, MERSENNE 756839 TECH
  • [2] A New Public-Key Cryptosystem via Mersenne Numbers
    Aggarwal, Divesh
    Joux, Antoine
    Prakash, Anupam
    Santha, Miklos
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 459 - 482
  • [3] Alagic G, 2019, Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process
  • [4] Alkim E., 2019, FRODOKEM
  • [5] Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
  • [6] [Anonymous], 2017, NIST POSTQ CRYPT PRO
  • [7] [Anonymous], 2017, FrodoKEM: Learning with errors key encapsulation
  • [8] [Anonymous], 2017, ROUND2 KEM PKE BASED
  • [9] Bernstein D. J., 2019, VREDENDAAL NTRU PRIM
  • [10] CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
    Bos, Joppe
    Ducas, Leo
    Kiltz, Eike
    Lepoint, Tancrede
    Lyubashevsky, Vadim
    Schanck, John M.
    Schwabe, Peter
    Seiler, Gregor
    Stehle, Damien
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 353 - 367