Open this publication in new window or tab >>Show others...
2024 (English)In: IEEE design & test, ISSN 2168-2356, E-ISSN 2168-2364, Vol. 41, no 5, p. 7-16Article in journal (Refereed) Published
Abstract [en]
CRYSTALS-Kyber has been selected by the NIST as a post-quantum public-key encryption and key establishment algorithm to be standardized. This makes it important to develop side-channel attack resistant implementations of CRYSTALS-Kyber. In this paper, we propose utilizing duplication combined with clock randomization as a means of protecting CRYSTALS-Kyber FPGA implementations from side-channel attacks. Such a countermeasure has been proven effective in ensuring side-channel resistance of AES FPGA implementations. It has the benefits of universal coverage, glitch immunity, and zero clock cycle overhead. We present a protected version of CRYSTALS-Kyber built on the top of the lightweight unprotected implementation by Xing el al. Our security evaluation shows that the protected implementation is resistant to deep learning-based side-channel attacks.
Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
CRYSTALS-Kyber, side-channel attack, countermeasure, clock randomization, duplication, deep learning
National Category
Engineering and Technology
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-344612 (URN)10.1109/mdat.2023.3298805 (DOI)001302503000004 ()2-s2.0-85165869219 (Scopus ID)
Funder
Swedish Civil Contingencies Agency, 2020-11632Vinnova, 2021-02426Swedish Research Council, 2018-04482
Note
QC 20240321
2024-03-212024-03-212024-09-10Bibliographically approved