Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures

被引:32
|
作者
Pessl, Peter [1 ]
机构
[1] Graz Univ Technol, IAIK, Graz, Austria
来源
关键词
Lattice-based cryptography; BLISS; Side-channel analysis; Countermeasures; ATTACK;
D O I
10.1007/978-3-319-49890-4_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, shuffling was proposed as an inexpensive means to protect the Gaussian sampling component against such attacks. However, the concrete effectiveness of this countermeasure has never been evaluated. We change that by presenting an in-depth analysis of the shuffling countermeasure. Our analysis consists of two main parts. First, we perform a side-channel attack on a Gaussian sampler implementation. We combine templates with a recovery of data-dependent branches, which are inherent to samplers. We show that an adversary can realistically recover some samples with very high confidence. Second, we present a new attack against the shuffling countermeasure in context of Gaussian sampling and lattice-based signatures. We do not attack the shuffling algorithm as such, but exploit differing distributions of certain variables. We give a broad analysis of our attack by considering multiple modeled SCA adversaries. We show that a simple version of shuffling is not an effective countermeasure. With our attack, a profiled SCA adversary can recover the key by observing only 7 000 signatures. A second version of this countermeasure, which uses Gaussian convolution in conjunction with shuffling twice, can increase side-channel security and the number of required signatures significantly. Here, roughly 285 000 observations are needed for a successful attack. Yet, this number is still practical.
引用
收藏
页码:153 / 170
页数:18
相关论文
共 50 条
  • [41] A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation
    Gornik, Andreas
    Moradi, Amir
    Oehm, Juergen
    Paar, Christof
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) : 1308 - 1319
  • [42] An Enhanced SHA3-based Hashing Method: A Side-channel attack countermeasure
    Abo-Taleb, A. Samir
    Nabil, M.
    Shalaby, M.
    Elramly, Salwa
    PROCEEDINGS OF 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND INFORMATION ENGINEERING (ICSIE 2019), 2019, : 145 - 150
  • [43] Shuffling Across Rounds: A Lightweight Strategy To Counter Side-channel Attacks
    Patranabis, Sikhar
    Roy, Debapriya Basu
    Vadnala, Praveen Kumar
    Mukhopadhyay, Debdeep
    Ghosh, Santosh
    PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 440 - 443
  • [44] Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
    Veyrat-Charvillon, Nicolas
    Medwed, Marcel
    Kerckhof, Stephanie
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 740 - 757
  • [45] Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
    Bhasin, Shivam
    Guilley, Sylvain
    Sauvage, Laurent
    Danger, Jean-Luc
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 195 - 207
  • [46] First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
    Prouff, Emmanuel
    McEvoy, Robert
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 81 - 96
  • [47] Power Profile Equalizer: a Lightweight Countermeasure against Side-channel Attack
    Wang, Chenguang
    Yan, Ming
    Cai, Yici
    Zhou, Qiang
    Yang, Jianlei
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 305 - 312
  • [48] Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
    Wang, Chenguang
    Cai, Yici
    Wang, Haoyi
    Zhou, Qiang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [49] All-or-Nothing Transforms as a countermeasure to differential side-channel analysis
    McEvoy, Robert P.
    Tunstall, Michael
    Whelan, Claire
    Murphy, Colin C.
    Marnane, William P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (03) : 291 - 304
  • [50] AES side-channel countermeasure using random tower field constructions
    Bonnecaze, Alexis
    Liardet, Pierre
    Venelli, Alexandre
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 69 (03) : 331 - 349