Loading [MathJax]/extensions/MathMenu.js
Exploiting the Central Reduction in Lattice-Based Cryptography | IEEE Journals & Magazine | IEEE Xplore

Exploiting the Central Reduction in Lattice-Based Cryptography


Leakage correlation with noise standard deviation across moduli, word sizes, reduction, and protection scenarios. Dashed lines show unprotected cases; solid lines show fi...

Abstract:

This paper questions the side-channel security of central reduction technique, which is widely adapted in efficient implementations of Lattice-Based Cryptography (LBC). W...Show More

Abstract:

This paper questions the side-channel security of central reduction technique, which is widely adapted in efficient implementations of Lattice-Based Cryptography (LBC). We show that the central reduction leads to a vulnerability by creating a strong dependency between the power consumption and the sign of sensitive intermediate values. We exploit this dependency by introducing the novel absolute value prediction function, which can be employed in higher-order non-profiled multi-query Side-Channel Analysis (SCA) attacks. Our results reveal that – compared to classical reduction algorithms – employing the central reduction scheme leads to a two-orders-of-magnitude decrease in the number of required SCA measurements to exploit secrets of masked implementations. We particularly show that our approach is valid for the prime moduli employed by Kyber and Dilithium, the lattice-based post-quantum algorithms selected by NIST. We practically evaluate our introduced approach by performing second-order non-profiled attacks against an open-source masked implementation of Kyber on an ARM Cortex-M4 micro-processor. In our experiments, we revealed the full secret key of the aforementioned masked implementation with only 250 power traces without any forms of profiling or choosing the ciphertexts.
Leakage correlation with noise standard deviation across moduli, word sizes, reduction, and protection scenarios. Dashed lines show unprotected cases; solid lines show fi...
Published in: IEEE Access ( Volume: 12)
Page(s): 166814 - 166833
Date of Publication: 08 November 2024
Electronic ISSN: 2169-3536

Funding Agency:


References

References is not available for this document.