Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures

被引:32
|
作者
Pessl, Peter [1 ]
机构
[1] Graz Univ Technol, IAIK, Graz, Austria
来源
关键词
Lattice-based cryptography; BLISS; Side-channel analysis; Countermeasures; ATTACK;
D O I
10.1007/978-3-319-49890-4_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, shuffling was proposed as an inexpensive means to protect the Gaussian sampling component against such attacks. However, the concrete effectiveness of this countermeasure has never been evaluated. We change that by presenting an in-depth analysis of the shuffling countermeasure. Our analysis consists of two main parts. First, we perform a side-channel attack on a Gaussian sampler implementation. We combine templates with a recovery of data-dependent branches, which are inherent to samplers. We show that an adversary can realistically recover some samples with very high confidence. Second, we present a new attack against the shuffling countermeasure in context of Gaussian sampling and lattice-based signatures. We do not attack the shuffling algorithm as such, but exploit differing distributions of certain variables. We give a broad analysis of our attack by considering multiple modeled SCA adversaries. We show that a simple version of shuffling is not an effective countermeasure. With our attack, a profiled SCA adversary can recover the key by observing only 7 000 signatures. A second version of this countermeasure, which uses Gaussian convolution in conjunction with shuffling twice, can increase side-channel security and the number of required signatures significantly. Here, roughly 285 000 observations are needed for a successful attack. Yet, this number is still practical.
引用
收藏
页码:153 / 170
页数:18
相关论文
共 50 条
  • [31] Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs
    Yu, Tianrun
    Cheng, Chi
    Yang, Zilong
    Wang, Yingchen
    Pan, Yanbin
    Weng, Jian
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 200 - 223
  • [32] Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks
    Zooker, David
    Elkoni, Matan
    Shalom, Or Ohev
    Weizman, Yoav
    Levi, Itamar
    Keren, Osnat
    Fish, Alexander
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [33] Analyzing Side-Channel Attack Vulnerabilities at RTL
    Lai, Xinhui
    Jenihhin, Maksim
    2023 IEEE 24TH LATIN AMERICAN TEST SYMPOSIUM, LATS, 2023,
  • [34] Hardware Trojan attacks on voltage scaling-based side-channel attack countermeasure
    Yu, Weize
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (03) : 321 - 326
  • [35] Energy-Efficient Side-Channel Attack Countermeasure With Awareness and Hybrid Configuration Based on It
    Li, Xiangyu
    Yang, Chaoqun
    Ma, Jiangsha
    Liu, Yongchang
    Yin, Shujuan
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) : 3355 - 3368
  • [36] Wire-Tap Codes as Side-Channel Countermeasure - An FPGA-Based Experiment
    Moradi, Amir
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : 341 - 359
  • [37] Lattice-based deniable ring signatures
    Wen Gao
    Liqun Chen
    Yupu Hu
    Christopher J. P. Newton
    Baocang Wang
    Jiangshan Chen
    International Journal of Information Security, 2019, 18 : 355 - 370
  • [38] Lattice-based deniable ring signatures
    Gao, Wen
    Chen, Liqun
    Hu, Yupu
    Newton, Christopher J. P.
    Wang, Baocang
    Chen, Jiangshan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (03) : 355 - 370
  • [39] QuadSeal: Quadruple Algorithmic Symmetrizing Countermeasure Against Power Based Side-channel Attacks
    Jayasinghe, Darshana
    Ignjatovic, Aleksandar
    Ambrose, Jude Angelo
    Ragel, Roshan
    Parameswaran, Sri
    2015 INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURE AND SYNTHESIS FOR EMBEDDED SYSTEMS (CASES), 2015, : 21 - 30
  • [40] A Side-channel Attack Countermeasure Based on Segmented Modular Exponent Randomizing in RSA Cryptosystem
    Zhang, Yiwei
    Zheng, Xinjian
    Peng, Bo
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 148 - 151