Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures

被引:32
|
作者
Pessl, Peter [1 ]
机构
[1] Graz Univ Technol, IAIK, Graz, Austria
来源
关键词
Lattice-based cryptography; BLISS; Side-channel analysis; Countermeasures; ATTACK;
D O I
10.1007/978-3-319-49890-4_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, shuffling was proposed as an inexpensive means to protect the Gaussian sampling component against such attacks. However, the concrete effectiveness of this countermeasure has never been evaluated. We change that by presenting an in-depth analysis of the shuffling countermeasure. Our analysis consists of two main parts. First, we perform a side-channel attack on a Gaussian sampler implementation. We combine templates with a recovery of data-dependent branches, which are inherent to samplers. We show that an adversary can realistically recover some samples with very high confidence. Second, we present a new attack against the shuffling countermeasure in context of Gaussian sampling and lattice-based signatures. We do not attack the shuffling algorithm as such, but exploit differing distributions of certain variables. We give a broad analysis of our attack by considering multiple modeled SCA adversaries. We show that a simple version of shuffling is not an effective countermeasure. With our attack, a profiled SCA adversary can recover the key by observing only 7 000 signatures. A second version of this countermeasure, which uses Gaussian convolution in conjunction with shuffling twice, can increase side-channel security and the number of required signatures significantly. Here, roughly 285 000 observations are needed for a successful attack. Yet, this number is still practical.
引用
收藏
页码:153 / 170
页数:18
相关论文
共 50 条
  • [1] Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature
    Fukushima, Kazuhide
    Okada, Hiroki
    Takarabt, Sofiane
    Korchi, Amina
    Hamoud, Meziane
    Karray, Khaled
    Souissy, Youssef
    Guilley, Sylvain
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 701 - 706
  • [2] Shuffling Based Side-Channel Countermeasure for Energy Harvester
    Nozaki, Yusuke
    Yoshikawa, Masaya
    2018 IEEE 7TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE 2018), 2018, : 714 - 715
  • [3] Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography
    Ravi, Prasanna
    Chattopadhyay, Anupam
    Bhasin, Shivam
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 188 - 189
  • [4] A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber
    Xu, Dejun
    Wang, Kai
    Tian, Jing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2025, 72 (03) : 504 - 508
  • [5] A Power Side-channel Attack Framework for Lattice-based Post Quantum Cryptography
    Hu W.
    Yuan C.
    Zheng J.
    Wang X.
    Li B.
    Tang S.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3210 - 3217
  • [6] Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
    Primas, Robert
    Pessl, Peter
    Mangard, Stefan
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 513 - 533
  • [7] Side-Channel Attacks on BLISS Lattice-Based Signatures Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers
    Espitau, Thomas
    Fouque, Pierre-Alain
    Gerard, Benoit
    Tibouchi, Mehdi
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1857 - 1874
  • [8] Generic side-channel attacks on cca-secure lattice-based pke and kems
    Ravi P.
    Roy S.S.
    Chattopadhyay A.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 307 - 335
  • [9] Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber
    Xu, Zhuang
    Pemberton, Owen Michael
    Roy, Sujoy Sinha
    Oswald, David
    Yao, Wang
    Zheng, Zhiming
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (09) : 2163 - 2176
  • [10] Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication
    Mujdei, Catinca
    Wouters, Lennert
    Karmakar, Angshuman
    Beckers, Arthur
    Mera, Jose Maria Bermudo
    Verbauwhede, Ingrid
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)