Loading [MathJax]/extensions/MathMenu.js
A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber | IEEE Conference Publication | IEEE Xplore

A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber


Abstract:

CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establishment algorithm to be standardized. This makes it important to assess...Show More

Abstract:

CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establishment algorithm to be standardized. This makes it important to assess how well CRYSTALS-Kyber implementations withstand side-channel attacks. Software implementations of CRYSTALS-Kyber have already been analyzed and the discovered vulnerabilities were patched in the subsequently released versions. In this paper, we present a profiling side-channel attack on a hardware implementation of CRYSTALS-Kyber. Since hardware implementations carry out computations in parallel, they are typically more difficult to break than their software counterparts. We demonstrate a successful message (session key) recovery attack on a Xilinx Artix-7 FPGA implementation of CRYSTALS-Kyber by deep learning-based power analysis. Our results indicate that currently available hardware implementations of CRYSTALS-Kyber need better protection against side-channel attacks.
Date of Conference: 22-26 May 2023
Date Added to IEEE Xplore: 12 July 2023
ISBN Information:

ISSN Information:

Conference Location: Venezia, Italy

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.