• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Artikel
  4. Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
 
  • Details
  • Full
Options
2021
Journal Article
Title

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

Abstract
Single-trace attacks are a considerable threat to implementations of classic public-key schemes, and their implications on newer lattice-based schemes are still not well understood. Two recent works have presented successful single-trace attacks targeting the Number Theoretic Transform (NTT), which is at the heart of many lattice-based schemes. However, these attacks either require a quite powerful side-channel adversary or are restricted to specific scenarios such as the encryption of ephemeral secrets. It is still an open question if such attacks can be performed by simpler adversaries while targeting more common public-key scenarios. In this paper, we answer this question positively. First, we present a method for crafting ring/module-LWE ciphertexts that result in sparse polynomials at the input of inverse NTT computations, independent of the used private key. We then demonstrate how this sparseness can be incorporated into a side-channel attack, thereby significantly improving noise resistance of the attack compared to previous works. The effectiveness of our attack is shown on the use-case of CCA2 secure Kyber k-module-LWE, where k ∈ {2, 3, 4}. Our k-trace attack on the long-term secret can handle noise up to a s < 1.2 in the noisy Hamming weight leakage model, also for masked implementations. A 2k-trace variant for Kyber1024 even allows noise s < 2.2 also in the masked case, with more traces allowing us to recover keys up to s < 2.7. Single-trace attack variants have a noise tolerance depending on the Kyber parameter set, ranging from s < 0.5 to s < 0.7. As a comparison, similar previous attacks in the masked setting were only successful with s < 0.5.
Author(s)
Hamburg, Mike
Rambus Labs, San Jose, USA
Hermelink, Julius
Universität der Bundeswehr München, Munich, Germany
Primas, Robert
Graz University of Technology, Graz, Austria
Samardjiska, Simona
Radboud University, Nijmegen, The Netherlands
Schamberger, Thomas
Technical University of Munich (TUM), Munich, Germany
Streit, Silvan  
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Strieder, Emanuele  orcid-logo
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Vredendaal, Christine van
NXP Semiconductors, Eindhoven, The Netherlands
Journal
IACR transactions on cryptographic hardware and embedded systems  
Project(s)
Aquorypt
Funder
Bundesministerium für Bildung und Forschung BMBF (Deutschland)  
Open Access
File(s)
Download (1.37 MB)
Rights
CC BY 4.0: Creative Commons Attribution
DOI
10.24406/publica-r-269883
10.46586/tches.v2021.i4.88-113
Language
English
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Keyword(s)
  • Kyber

  • NTT

  • belief propagation

  • side-channel attack

  • CCA

  • BKZ

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024