Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman

被引:16
作者
Koziel, Brian [1 ]
Azarderakhsh, Reza [2 ,3 ]
Jao, David [4 ]
机构
[1] Texas Instruments Inc, Dallas, TX 75243 USA
[2] CEECS Dept, Boca Raton, FL USA
[3] I SENSE FAU, Boca Raton, FL USA
[4] Univ Waterloo, C&O Dept, Waterloo, ON, Canada
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017 | 2018年 / 10719卷
关键词
Side-channel attacks; Post-quantum cryptography; Isogeny-based cryptosystems; Elliptic curve cryptography;
D O I
10.1007/978-3-319-72565-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present three side-channel attacks on the quantum-resistant supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol. These refined power analysis attacks target the representation of a zero value in a physical implementation of SIDH to extract bits of the secret key. To understand the behavior of these zero-attacks on SIDH, we investigate the representation of zero in the context of quadratic extension fields and isogeny arithmetic. We then present three different refined power analysis attacks on SIDH. Our first and second attacks target the Jao, De Feo, and Plut three-point Montgomery ladder by utilizing a partial-zero attack and zero-value attack, respectively. Our third attack proposes a method to break the large-degree isogeny by utilizing zero-values in the context of isogenies. The goal of this paper is to illustrate additional security concerns for an SIDH static-key user.
引用
收藏
页码:64 / 81
页数:18
相关论文
共 50 条
  • [41] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21
  • [42] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [43] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [44] Remote Side-Channel Attacks on Heterogeneous SoC
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    Olivier, Francis
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 109 - 125
  • [45] Side-Channel Attacks Detection Methods: A Survey
    Assaeedi, Joanna
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 288 - 296
  • [46] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [47] On the Feasibility of Side-Channel Attacks in a Virtualized Environment
    Vateva-Gurova, Tsvetoslava
    Luna, Jesus
    Pellegrino, Giancarlo
    Suri, Neeraj
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
  • [48] The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents
    Jorge Chávez-Saab
    Jesús-Javier Chi-Domínguez
    Samuel Jaques
    Francisco Rodríguez-Henríquez
    Journal of Cryptographic Engineering, 2022, 12 : 349 - 368
  • [49] Scan attacks on side-channel and fault attack resistant public-key implementations
    Jean Da Rolt
    Amitabh Das
    Santosh Ghosh
    Giorgio Di Natale
    Marie-Lise Flottes
    Bruno Rouzeyre
    Ingrid Verbauwhede
    Journal of Cryptographic Engineering, 2012, 2 (4) : 207 - 219
  • [50] Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks
    Xie, Jia-Yi
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2674 - 2685