kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (10 of 15) Show all publications
Wang, R., Gärtner, J. & Dubrova, E. (2025). Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis. In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025: . Paper presented at 55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025 (pp. 135-140). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis
2025 (English)In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 135-140Conference paper, Published paper (Refereed)
Abstract [en]

The CRYSTALS-Dilithium digital signature scheme, selected by NIST as a post-quantum cryptography (PQC) standard under the name ML-DSA, employs a public key compression technique intended for performance optimization. Specifically, the module learning with error instance (A, t) is compressed by omitting the low-order bits t0 of the vector t. It was recently shown that knowledge of t0 enables more effective side-channel attacks on Dilithium implementations. Another recent work demonstrated a method for reconstructing t0 from multiple signatures. In this paper, we build upon this method by applying profiled deep learning-assisted side-channel analysis to partially recover the least significant bit of t0 from power traces. As a result, the number of signatures required for the reconstruction of t0 can be reduced by roughly half. We demonstrate how the new t0 reconstruction method enhances the efficiency of recovering the secret key component s1, thereby facilitating digital signature forgery, on an ARM Cortex-M4 implementation of Dilithium.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Dilithium, ML-DSA, post-quantum cryptography, Public-key cryptography, side-channel attack
National Category
Signal Processing
Identifiers
urn:nbn:se:kth:diva-368822 (URN)10.1109/ISMVL64713.2025.00034 (DOI)001540510800026 ()2-s2.0-105009349390 (Scopus ID)
Conference
55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025
Note

Part of ISBN 9798331507442

QC 20250902

Available from: 2025-09-02 Created: 2025-09-02 Last updated: 2025-12-08Bibliographically approved
Ji, Y., Dubrova, E. & Wang, R. (2025). Is Your Chip Leaking Secrets via RF Signals?. In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025: . Paper presented at 55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025 (pp. 141-146). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Is Your Chip Leaking Secrets via RF Signals?
2025 (English)In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 141-146Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we present a side-channel attack on the hardware AES accelerator of a Bluetooth chip used in millions of devices worldwide, ranging from wearables and smart home products to industrial IoT. The attack leverages information about AES computations unintentionally transmitted by the chip together with RF signals to recover the encryption key. Unlike traditional side-channel attacks that rely on power or near-field electromagnetic emissions as sources of information, RF-based attacks leave no evidence of tampering, as they do not require package removal, chip decapsulation, or additional soldered components. However, side-channel emissions extracted from RF signals are considerably weaker and noisier, necessitating more traces for key recovery. The presented profiled machine learning-assisted attack can recover the full encryption key from 45,000 traces captured at a one-meter distance from the target device, with each trace being an average of 10,000 samples per encryption. This is a fourfold improvement over the correlation analysis-based attack on the same AES accelerator.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-368821 (URN)10.1109/ISMVL64713.2025.00035 (DOI)001540510800027 ()2-s2.0-105009322477 (Scopus ID)
Conference
55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025
Note

Part of ISBN 9798331507442

QC 20250902

Available from: 2025-09-02 Created: 2025-09-02 Last updated: 2025-12-08Bibliographically approved
Wang, R. (2025). Side-Channel Attacks on Post-Quantum PKE/KEMs and Digital Signatures. (Doctoral dissertation). KTH Royal Institute of Technology
Open this publication in new window or tab >>Side-Channel Attacks on Post-Quantum PKE/KEMs and Digital Signatures
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Traditional public key cryptosystems rely on the hardness of specific mathematical problems, such as integer factorization and discrete logarithm problem. However, these problems can be solved efficiently by Shor's algorithm on a large-scale quantum computer. Although the development of quantum computers has progressed slowly over the past 40 years, it is estimated that a cryptographically relevant quantum computer is likely to be available in 2040, which intensifies the need for quantum-resistant cryptographic algorithms. In response to the quantum threat, in 2016, NIST launched a competition for standardizing post-quantum cryptographic primitives. In August 2024, NIST selected CRYSTALS-Kyber as the public key encryption and key encapsulation standard, and CRYSTALS-Dilithium as the digital signature standard.

However, algorithms which are secure from the perspective of conventional cryptanalysis may still be vulnerable to physical attacks, such as side-channel attacks. This thesis evaluates the resilience of software implementations of three lattice-based post-quantum cryptographic algorithms: Saber, CRYSTALS-Kyber, and CRYSTALS-Dilithium to side-channel attacks.

The presented results are based on seven appended papers. Two of them focus on side-channel attacks on Saber, four target CRYSTALS-Kyber, and one considers CRYSTALS-Dilithium. The main contributions of the thesis are:

  1. We evaluate and compare power side-channel and EM side-channel attacks, pointing that amplitude-modulated EM emissions are typically weaker and require a higher sampling rate for secret recovery. We also investigate the difficulty of performing attacks on protected and unprotected implementations.
  2. We propose several methods to improve the attack efficiency. For example, a novel neural network model aggregation technique called threshold voting is introduced for deep learning-based attacks. A higher-order attack on CRYSTALS-Kyber is presented by combining the leakages from Barrett reduction and message decoding. Furthermore, an optimal chosen-ciphertext construction strategy is developed to maximize the probability of secret key recovery given a fixed probability of message bit recovery. 
  3. We provide a thorough discussion of various attack scenarios, including attacks on encapsulation, decapsulation, and signing procedures. For each scenario, we outline the assumptions and requirements for a successful attack.
  4. We present countermeasures to mitigate side-channel attacks at both the algorithmic and hardware levels. We also discuss the limitations of these countermeasures, as well as the challenges associated with deep learning-based attacks.

Most of the methods presented in this thesis are not limited to the specific algorithms described in the papers, and can be extended to other algorithms that are similar to Saber, CRYSTALS-Kyber, and CRYSTALS-Dilithium.

Abstract [sv]

Traditionella kryptosystem med offentlig nyckel bygger på svårigheten i specifika matematiska problem, såsom faktorisering av heltal och problemet med diskreta logaritmer. Dessa problem kan dock lösas effektivt med Shors algoritm på en storskalig kvantdator. Även om utvecklingen av kvantdatorer har gått långsamt under de senaste 40 åren, beräknas det att en kryptografiskt relevant kvantdator sannolikt kommer att finnas tillgänglig år 2040, vilket ökar behovet av kvantresistenta kryptografiska algoritmer. Som svar på hotet från kvantdatorer lanserade NIST 2016 en tävling för standardisering av kvantdatorsäkra primitiver. I augusti 2024 valde NIST CRYSTALS-Kyber som standard för asymmetrisk kryptering och nyckelinkapsling, och CRYSTALS-Dilithium som standard för digitala signaturer.

Algoritmer som är säkra ur konventionell kryptanalytisk synvinkel kan dock fortfarande vara sårbara för fysiska attacker, såsom sidokanalsattacker. Denna avhandling utvärderar motståndskraften hos mjukvaruimplementationer av tre gitterbaserade kvantdatorsäkra algoritmer: Saber, CRYSTALS-Kyber och CRYSTALS-Dilithium mot sidokanalsattacker.

De presenterade resultaten baseras på sju bifogade artiklar. Två av dem fokuserar på sidokanalsattacker mot Saber, fyra riktar sig mot CRYSTALS-Kyber, och en behandlar CRYSTALS-Dilithium. Avhandlingens huvudsakliga bidrag är:

  1. Vi utvärderar och jämför effektbaserade och EM-baserade sidokanalsattacker, och påpekar att amplitudmodulerade EM-emissioner typiskt är svagare och kräver högre samplingsfrekvens för att återskapa hemligheter. Vi undersöker även svårigheten med att utföra attacker på skyddade och oskyddade implementationer.
  2. Vi föreslår flera metoder för att förbättra attackeffektiviteten. Till exempel introduceras en ny teknik för aggregering av neurala nätverksmodeller, kallad “threshold voting”, för attacker baserade på djupinlärning. En högre ordningens attack mot CRYSTALS-Kyber presenteras genom att kombinera läckage från Barrett-reduktion och meddelandede-kodning. Dessutom utvecklas en optimal strategi för valda chiffertextattacker för att maximera sannolikheten för att återskapa en hemlig nyckel givet en fast sannolikhet att återskapa av meddelandebitar.
  3. Vi ger en grundlig diskussion av olika attackscenarier, inklusive attacker mot inkapsling, avkapsling och signering. För varje scenario redogör vi för antaganden och krav för en framgångsrik attack.
  4. Vi presenterar motåtgärder för att försvåra sidokanalsattacker både på algoritm- och hårdvarunivå. Vi diskuterar också begränsningarna hos dessa motåtgärder samt utmaningarna med attacker baserade på djupinlärning.

De flesta metoder som presenteras i denna avhandling är inte begränsade till de specifika algoritmer som beskrivs i artiklarna, utan kan även tillämpas på andra algoritmer som liknar Saber, CRYSTALS-Kyber och CRYSTALS-Dilithium.

Place, publisher, year, edition, pages
KTH Royal Institute of Technology, 2025. p. xxiv, 125
Series
TRITA-EECS-AVL ; 2025:90
Keywords
Hardware Security, Side-Channel Attacks, Post-Quantum Cryptography, Public Key Encryption, Key Encapsulation Mechanism, Digital Signature, Hårdvarusäkerhet, Sidokanalsattacker, Kvantdatorsäker Kryptografi, Asymmetrisk Kryptering, Nyckelkapslingsmekanism, Digital signatur
National Category
Embedded Systems
Research subject
Information and Communication Technology
Identifiers
urn:nbn:se:kth:diva-371765 (URN)978-91-8106-417-9 (ISBN)
Public defence
2025-11-17, https://kth-se.zoom.us/j/66638877349, F3, Lindstedtsvägen 26, KTH Campus, Stockholm, 13:00 (English)
Opponent
Supervisors
Note

QC 20251019

Available from: 2025-10-19 Created: 2025-10-17 Last updated: 2025-10-27Bibliographically approved
Wang, R. & Dubrova, E. (2024). A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation Algorithm. In: Foundations and Practice of Security - 16th International Symposium, FPS 2023, Revised Selected Papers: . Paper presented at 16th International Symposium on Foundations and Practice of Security, FPS 2023, Bordeaux, France, Dec 11 2023 - Dec 13 2023 (pp. 424-439). Springer Nature
Open this publication in new window or tab >>A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation Algorithm
2024 (English)In: Foundations and Practice of Security - 16th International Symposium, FPS 2023, Revised Selected Papers, Springer Nature , 2024, p. 424-439Conference paper, Published paper (Refereed)
Abstract [en]

In July 2022, NIST selected CRYSTALS-Kyber as a new post-quantum secure public key encryption and key encapsulation mechanism to be standardized. To safeguard its shared and secret keys from side-channel attacks (SCA), countermeasures such as masking and shuffling are applied. However, the existing SCA-protected implementations of CRYSTALS-Kyber protect the decapsulation algorithm only. The encapsulation algorithm is not covered because single-trace shared key recovery attacks on encapsulation are not considered feasible. Since the same shared key is never encapsulated more than once, the attacker gets only a single trace per shared key from the execution of the encapsulation algorithm. In this paper, we demonstrate a practical single-trace shared key recovery attack on a first-order masked implementation of the encapsulation algorithm of Kyber-768 in ARM Cortex-M4 based on deep learning-assisted power analysis. Our main contribution is a new aggregation method for ensemble learning that enables enumeration during shared key recovery. Our experimental results show that a full shared key can be recovered with a 91% probability on average from a single trace captured from a different from profiling device.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Kyber, LWE/LWR-based KEM, Post-quantum cryptography, Public-key cryptography, Side-channel attack
National Category
Computer Engineering
Identifiers
urn:nbn:se:kth:diva-346848 (URN)10.1007/978-3-031-57537-2_26 (DOI)001280331400027 ()2-s2.0-85192540751 (Scopus ID)
Conference
16th International Symposium on Foundations and Practice of Security, FPS 2023, Bordeaux, France, Dec 11 2023 - Dec 13 2023
Note

QC 20240530

Available from: 2024-05-24 Created: 2024-05-24 Last updated: 2025-10-17Bibliographically approved
Wang, R., Brisfors, M. & Dubrova, E. (2024). A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation. In: Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings: . Paper presented at 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, Abu Dhabi, United Arab Emirates, Mar 5 2024 - Mar 8 2024 (pp. 301-324). Springer Nature
Open this publication in new window or tab >>A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation
2024 (English)In: Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings, Springer Nature , 2024, p. 301-324Conference paper, Published paper (Refereed)
Abstract [en]

In response to side-channel attacks on masked implementations of post-quantum cryptographic algorithms, a new bitsliced higher-order masked implementation of CRYSTALS-Kyber has been presented at CHES’2022. The bitsliced implementations are typically more difficult to break by side-channel analysis because they execute a single instruction across multiple bits in parallel. However, in this paper, we reveal new vulnerabilities in the masked Boolean to arithmetic conversion procedure of this implementation that make the shared and secret key recovery possible. We also present a new chosen ciphertext construction method which maximizes secret key recovery probability for a given message bit recovery probability. We demonstrate practical shared and secret key recovery attacks on the first-, second- and third-order masked implementations of Kyber-768 in ARM Cortex-M4 using profiled deep learning-based power analysis.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Kyber, LWE/LWR-based KEM, Post-quantum cryptography, Public-key cryptography, Side-channel attack
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-344819 (URN)10.1007/978-3-031-54776-8_12 (DOI)001206024100012 ()2-s2.0-85187721430 (Scopus ID)
Conference
22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, Abu Dhabi, United Arab Emirates, Mar 5 2024 - Mar 8 2024
Note

QC 20240409

 Part of ISBN 9783031547751

Available from: 2024-03-28 Created: 2024-03-28 Last updated: 2025-12-05Bibliographically approved
Jendral, S., Ngo, K., Wang, R. & Dubrova, E. (2024). Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace. In: Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024: . Paper presented at 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, McLean, United States of America, May 6 2024 - May 9 2024 (pp. 70-73). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace
2024 (English)In: Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 70-73Conference paper, Published paper (Refereed)
Abstract [en]

CRYSTALS-Kyber is a post-quantum secure key encapsulation mechanism which is currently being standardized by the NIST. This makes it important to assess the resistance of CRYSTALS-Kyber implementations to physical attacks. In this paper, we present an attack on a masked and shuffled implementation of CRYSTALS-Kyber in ARM Cortex-M4 that combines side-channel analysis (SCA) with fault injection. First, voltage glitching is performed to bypass the shuffling. We found settings that consistently skip the desired instructions without crashing the device. After the successful fault injection, a deep learning-assisted profiled power analysis based on the Hamming weight leakage model is applied to recover the message (shared key). We use a partial key enumeration method that significantly increases the success rate of message recovery. We also propose countermeasures against the presented attack.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
CRYSTALS-Kyber, Fault injection, ML-KEM, Post-quantum cryptography, Side-channel attack
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-348774 (URN)10.1109/HOST55342.2024.10545390 (DOI)001243879400023 ()2-s2.0-85196103145 (Scopus ID)
Conference
2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, McLean, United States of America, May 6 2024 - May 9 2024
Note

QC 20240701

Part of ISBN 979-835037394-3

Available from: 2024-06-27 Created: 2024-06-27 Last updated: 2025-12-05Bibliographically approved
Wang, R., Ngo, K., Gärtner, J. & Dubrova, E. (2024). Unpacking Needs Protection: A Single-Trace Secret Key Recovery Attack on Dilithium. IACR Communications in Cryptology
Open this publication in new window or tab >>Unpacking Needs Protection: A Single-Trace Secret Key Recovery Attack on Dilithium
2024 (English)In: IACR Communications in Cryptology, E-ISSN 3006-5496Article in journal (Refereed) Epub ahead of print
Abstract [en]

Most of the previous attacks on Dilithium exploit side-channel information which is leaked during the computation of the polynomial multiplication cs1, where s1 is a small-norm secret and c is a verifier's challenge. In this paper, we present a new attack utilizing leakage during secret key unpacking in the signing algorithm. The unpacking is also used in other post-quantum cryptographic algorithms, including Kyber, because inputs and outputs of their API functions are byte arrays. Exploiting leakage during unpacking is more challenging than exploiting leakage during the computation of cs1 since c varies for each signing, while the unpacked secret key remains constant. Therefore, post-processing is required in the latter case to recover a full secret key. We present two variants of post-processing. In the first one, a half of the coefficients of the secret s1 and the error s2 is recovered by profiled deep learning-assisted power analysis and the rest is derived by solving linear equations based on t = As1 + s2, where A and t are parts of the public key. This case assumes knowledge of the least significant bits of t, t0. The second variant uses lattice reduction to derive s1 without the knowledge of t0. However, it needs a larger portion of s1 to be recovered by power analysis. We evaluate both variants on an ARM Cortex-M4 implementation of Dilithium-2. The experiments show that the attack assuming the knowledge of t0 can recover s1 from a single trace captured from a different from profiling device with a non-negligible probability.

Place, publisher, year, edition, pages
International Association for Cryptologic Research, 2024
Keywords
Dilithium, post-quantum digital signature, key recovery attack, side-channel attack, lattice reduction
National Category
Engineering and Technology
Identifiers
urn:nbn:se:kth:diva-371699 (URN)10.62056/a0fh89n4e (DOI)
Note

QC 20251019

Available from: 2025-10-16 Created: 2025-10-16 Last updated: 2025-10-19Bibliographically approved
Wang, R., Ngo, K. & Dubrova, E. (2023). A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations. In: Lecture Notes in Computer Science: . Paper presented at 25th Annual International Conference on Information Security and Cryptology (ICISC'22), Seoul, South Korea, November 30 – December 2, 2022 (pp. 450-471). Springer Nature, 13849
Open this publication in new window or tab >>A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations
2023 (English)In: Lecture Notes in Computer Science, Springer Nature , 2023, Vol. 13849, p. 450-471Conference paper, Published paper (Refereed)
Abstract [en]

Creating a good deep learning model is an art which requires expertise in deep learning and a large set of labeled data for training neural networks. Neither is readily available. In this paper, we introduce a method that enables us to recover messages of LWE/LWR-based PKE/KEMs using simple multilayer perceptron (MLP) models trained on a small dataset. The core idea is to extend the attack dataset so that at least one of its traces has the ground truth label to which the models are biased towards. We demonstrate the effectiveness of the presented method on the examples of CRYSTALS-Kyber and Saber algorithms implemented in ARM Cortex-M4 CPU on nRF52832 system-on-chip supporting Bluetooth 5.2.We use amplitude-modulated EM emanations which are typically weaker and noisier than power or near-field EM side channels, and thus more difficult to exploit.

Place, publisher, year, edition, pages
Springer Nature, 2023
Keywords
Public-key cryptography, Post-quantum cryptography, CRYSTALS-Kyber, Saber, LWE/LWR-based KEM, Side-channel attack, EM analysis
National Category
Engineering and Technology
Identifiers
urn:nbn:se:kth:diva-324660 (URN)10.1007/978-3-031-29371-9_22 (DOI)000996634000022 ()2-s2.0-85152625186 (Scopus ID)
Conference
25th Annual International Conference on Information Security and Cryptology (ICISC'22), Seoul, South Korea, November 30 – December 2, 2022
Note

QC 20230328

Available from: 2023-03-09 Created: 2023-03-09 Last updated: 2025-10-17
Ji, Y., Wang, R., Ngo, K. & Dubrova, E. (2023). A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber. In: Proceedings of the 2023 IEEE European Test Symposium (ETS'23): . Paper presented at 28th IEEE European Test Symposium, ETS 2023, Venice, Italy, 22 May - 26 May 2023. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber
2023 (English)In: Proceedings of the 2023 IEEE European Test Symposium (ETS'23), Institute of Electrical and Electronics Engineers Inc. , 2023Conference paper, Published paper (Refereed)
Abstract [en]

CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establishment algorithm to be standardized. This makes it important to assess how well CRYSTALS-Kyber implementations withstand side-channel attacks. Software implementations of CRYSTALS-Kyber have already been analyzed and the discovered vulnerabilities were patched in the subsequently released versions. In this paper, we present a profiling side-channel attack on a hardware implementation of CRYSTALS-Kyber. Since hardware implementations carry out computations in parallel, they are typically more difficult to break than their software counterparts. We demonstrate a successful message (session key) recovery attack on a Xilinx Artix-7 FPGA implementation of CRYSTALS-Kyber  by deep learning-based power analysis. Our results indicate that currently available hardware implementations of CRYSTALS-Kyber need better protection against side-channel attacks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
CRYSTALS-Kyber, deep learning, FPGA, LWE-based KEM, Post-quantum cryptography, power analysis, side-channel attack
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-324662 (URN)10.1109/ETS56758.2023.10174000 (DOI)001032757100017 ()2-s2.0-85166264680 (Scopus ID)
Conference
28th IEEE European Test Symposium, ETS 2023, Venice, Italy, 22 May - 26 May 2023
Note

QC 20230824

Available from: 2023-03-09 Created: 2023-03-09 Last updated: 2023-09-21Bibliographically approved
Wang, R. & Dubrova, E. (2023). A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts. In: Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Proceedings: . Paper presented at 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, Rabat, Morocco, May 29 2023 - May 31 2023 (pp. 109-128). Springer Nature
Open this publication in new window or tab >>A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts
2023 (English)In: Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Proceedings, Springer Nature , 2023, p. 109-128Conference paper, Published paper (Refereed)
Abstract [en]

At CHES’2021, a chosen ciphertext attack combined with belief propagation which can recover the long-term secret key of CRYSTALS-Kyber from side-channel information of the number theoretic transform (NTT) computations was presented. The attack requires k traces from the inverse NTT step of decryption, where k is the module rank, for a noise tolerance in the Hamming weight (HW) leakage on simulated data. In this paper, we present an attack which can recover the secret key of CRYSTALS-Kyber from k chosen ciphertexts using side-channel information of the Barret reduction and message decoding steps of decryption, for. The key novel idea is to create a unique mapping between the secret key coefficients and multiple intermediate variables of these procedures. The redundancy in the mapping patterns enables us to detect errors in the secret key coefficients recovered from side-channel information. We demonstrate the attack on the example of a software implementation of Kyber-768 in ARM Cortex-M4 CPU using deep learning-based power analysis.

Place, publisher, year, edition, pages
Springer Nature, 2023
Series
Lecture Notes in Computer Science ; 13874
Keywords
CRYSTALS-Kyber, post-quantum cryptography, Public-key cryptography, side-channel attack
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-338631 (URN)10.1007/978-3-031-33017-9_7 (DOI)2-s2.0-85161187505 (Scopus ID)
Conference
4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, Rabat, Morocco, May 29 2023 - May 31 2023
Note

Part of ISBN 9783031330162

QC 20231102

Available from: 2023-11-02 Created: 2023-11-02 Last updated: 2025-10-17Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6281-4091

Search in DiVA

Show all publications