Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman

被引:16
|
作者
Koziel, Brian [1 ]
Azarderakhsh, Reza [2 ,3 ]
Jao, David [4 ]
机构
[1] Texas Instruments Inc, Dallas, TX 75243 USA
[2] CEECS Dept, Boca Raton, FL USA
[3] I SENSE FAU, Boca Raton, FL USA
[4] Univ Waterloo, C&O Dept, Waterloo, ON, Canada
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017 | 2018年 / 10719卷
关键词
Side-channel attacks; Post-quantum cryptography; Isogeny-based cryptosystems; Elliptic curve cryptography;
D O I
10.1007/978-3-319-72565-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present three side-channel attacks on the quantum-resistant supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol. These refined power analysis attacks target the representation of a zero value in a physical implementation of SIDH to extract bits of the secret key. To understand the behavior of these zero-attacks on SIDH, we investigate the representation of zero in the context of quadratic extension fields and isogeny arithmetic. We then present three different refined power analysis attacks on SIDH. Our first and second attacks target the Jao, De Feo, and Plut three-point Montgomery ladder by utilizing a partial-zero attack and zero-value attack, respectively. Our third attack proposes a method to break the large-degree isogeny by utilizing zero-values in the context of isogenies. The goal of this paper is to illustrate additional security concerns for an SIDH static-key user.
引用
收藏
页码:64 / 81
页数:18
相关论文
共 50 条
  • [21] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [22] Circuits and design techniques for secure ICs resistant to side-channel attacks
    Verbauwhede, I.
    Tiri, K.
    Hwang, D.
    Schaumont, P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS, 2006, : 57 - +
  • [23] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [24] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [25] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [26] On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography
    Jedlicka, Petr
    Malina, Lukas
    Socha, Petr
    Gerlich, Tomas
    Martinasek, Zdenek
    Hajny, Jan
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [27] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (04) : 511 - 518
  • [28] The investigation of neural networks performance in side-channel attacks
    Kong, Yinan
    Saeedi, Ehsan
    ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (01) : 607 - 623
  • [29] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518
  • [30] Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography
    Wu W.-B.
    Liu Z.
    Yang H.
    Zhang J.-P.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (04): : 1165 - 1185