kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (10 of 162) Show all publications
Ji, Y. & Dubrova, E. (2025). A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 15(1), Article ID 7.
Open this publication in new window or tab >>A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber
2025 (English)In: JOURNAL OF CRYPTOGRAPHIC ENGINEERING, ISSN 2190-8508, Vol. 15, no 1, article id 7Article in journal (Refereed) Published
Abstract [en]

NIST has recently selected CRYSTALS-Kyber as a new public key encryption and key establishment algorithm to be standardized. This makes it important to evaluate the resistance of CRYSTALS-Kyber implementations to side-channel attacks. Software implementations of CRYSTALS-Kyber have already been thoroughly analysed. The discovered vulnerabilities have helped improve subsequently released versions and promoted stronger countermeasures against side-channel attacks. In this paper, we present the first attack on a protected hardware implementation of CRYSTALS-Kyber. We demonstrate a practical message (shared key) recovery attack on the first-order masked FPGA implementation of Kyber-512 by Kamucheka et al. (2022) using power analysis based on the Hamming distance leakage model. The presented attack exploits a vulnerability located in the masked message decoding function executed during the decryption step of decapsulation. The message recovery is performed using a profiled deep learning-assisted method which extracts the message directly, without explicitly retrieving each share. By repeating the same decapsulation multiple times, it is possible to increase the success rate of full shared key recovery to 99%. We also analyse the feasibility of recovering shared keys during encapsulation and propose a countermeasure against the presented attack that is also applicable to FPGA implementations of other cryptographic algorithms.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Public key cryptography, Post-quantum cryptography, CRYSTALS-Kyber, LWE/LWR-based KEM, Side-channel attack, Deep learning
National Category
Computer Engineering
Identifiers
urn:nbn:se:kth:diva-362930 (URN)10.1007/s13389-025-00375-7 (DOI)001458493000002 ()2-s2.0-105001686111 (Scopus ID)
Note

QC 20250430

Available from: 2025-04-30 Created: 2025-04-30 Last updated: 2025-04-30Bibliographically approved
Wang, R., Gärtner, J. & Dubrova, E. (2025). Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis. In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025: . Paper presented at 55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025 (pp. 135-140). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis
2025 (English)In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 135-140Conference paper, Published paper (Refereed)
Abstract [en]

The CRYSTALS-Dilithium digital signature scheme, selected by NIST as a post-quantum cryptography (PQC) standard under the name ML-DSA, employs a public key compression technique intended for performance optimization. Specifically, the module learning with error instance (A, t) is compressed by omitting the low-order bits t0 of the vector t. It was recently shown that knowledge of t0 enables more effective side-channel attacks on Dilithium implementations. Another recent work demonstrated a method for reconstructing t0 from multiple signatures. In this paper, we build upon this method by applying profiled deep learning-assisted side-channel analysis to partially recover the least significant bit of t0 from power traces. As a result, the number of signatures required for the reconstruction of t0 can be reduced by roughly half. We demonstrate how the new t0 reconstruction method enhances the efficiency of recovering the secret key component s1, thereby facilitating digital signature forgery, on an ARM Cortex-M4 implementation of Dilithium.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Dilithium, ML-DSA, post-quantum cryptography, Public-key cryptography, side-channel attack
National Category
Signal Processing
Identifiers
urn:nbn:se:kth:diva-368822 (URN)10.1109/ISMVL64713.2025.00034 (DOI)001540510800026 ()2-s2.0-105009349390 (Scopus ID)
Conference
55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025
Note

Part of ISBN 9798331507442

QC 20250902

Available from: 2025-09-02 Created: 2025-09-02 Last updated: 2025-12-08Bibliographically approved
Aknesil, C., Dubrova, E., Lindskog, N., Sternby, J. & Englund, H. (2025). Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks. In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025: . Paper presented at 55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025 (pp. 129-134). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks
Show others...
2025 (English)In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 129-134Conference paper, Published paper (Refereed)
Abstract [en]

As artificial intelligence plays an increasingly important role in decision-making within critical infrastructure, ensuring the authenticity and integrity of neural networks is crucial. This paper addresses the problem of detecting cloned neural networks. We present a method for identifying clones that employs a combination of metrics from both the information and physical domains: output predictions, probability score vectors, and power traces measured from the device running the neural network during inference. We compare the effectiveness of each metric individually, as well as in combination. Our results show that the effectiveness of both the information and the physical domain metrics is excellent for a clone that is a near replica of the target neural network. Furthermore, both the physical domain metric individually and the hybrid approach outperform the information domain metrics at detecting clones whose weights were extracted with low accuracy. The presented method offers a practical solution for verifying neural network authenticity and integrity. It is particularly useful in scenarios where neural networks are at risk of model extraction attacks, such as in cloud-based machine learning services.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
fingerprinting, intellectual property, model extraction, neural networks, power side channels
National Category
Communication Systems Computer Sciences
Identifiers
urn:nbn:se:kth:diva-368825 (URN)10.1109/ISMVL64713.2025.00033 (DOI)001540510800025 ()2-s2.0-105009321533 (Scopus ID)
Conference
55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025
Note

Part of ISBN 9798331507442

QC 20250902

Available from: 2025-09-02 Created: 2025-09-02 Last updated: 2025-12-08Bibliographically approved
Ji, Y., Dubrova, E. & Wang, R. (2025). Is Your Chip Leaking Secrets via RF Signals?. In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025: . Paper presented at 55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025 (pp. 141-146). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Is Your Chip Leaking Secrets via RF Signals?
2025 (English)In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 141-146Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we present a side-channel attack on the hardware AES accelerator of a Bluetooth chip used in millions of devices worldwide, ranging from wearables and smart home products to industrial IoT. The attack leverages information about AES computations unintentionally transmitted by the chip together with RF signals to recover the encryption key. Unlike traditional side-channel attacks that rely on power or near-field electromagnetic emissions as sources of information, RF-based attacks leave no evidence of tampering, as they do not require package removal, chip decapsulation, or additional soldered components. However, side-channel emissions extracted from RF signals are considerably weaker and noisier, necessitating more traces for key recovery. The presented profiled machine learning-assisted attack can recover the full encryption key from 45,000 traces captured at a one-meter distance from the target device, with each trace being an average of 10,000 samples per encryption. This is a fourfold improvement over the correlation analysis-based attack on the same AES accelerator.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-368821 (URN)10.1109/ISMVL64713.2025.00035 (DOI)001540510800027 ()2-s2.0-105009322477 (Scopus ID)
Conference
55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025
Note

Part of ISBN 9798331507442

QC 20250902

Available from: 2025-09-02 Created: 2025-09-02 Last updated: 2025-12-08Bibliographically approved
Lindskog, N., Englund, H., Sternby, J. & Dubrova, E. (2025). Machine Learning-Assisted Side-Channel Analysis for Software Integrity Verification. In: 2025 IEEE European Test Symposium, ETS 2025: . Paper presented at 2025 European Test Symposium-ETS-Annual, MAY 26-30, 2025, Tallinn, Estonia. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Machine Learning-Assisted Side-Channel Analysis for Software Integrity Verification
2025 (English)In: 2025 IEEE European Test Symposium, ETS 2025, Institute of Electrical and Electronics Engineers (IEEE), 2025Conference paper, Published paper (Refereed)
Abstract [en]

Traditional cryptographic methods for software integrity verification rely on validating cryptographic signatures attached to software binaries. However, these methods primarily focus on load-time measurements and may be circumvented by an attacker interfering with the boot process. To address this limitation, we propose a novel approach that uses side-channel data collected during software execution to generate a proof of software integrity. Through a side-channel trace encoder, we generate cryptographic keys derived from the unique side-channel profiles of software processes. This ensures that only the processes with expected side-channel characteristics can produce the valid key, effectively linking software integrity verification to runtime behavior. We demonstrate the feasibility of this approach in a secure boot setting compliant with the TCG DICE framework. The presented solution provides holistic boot protection while enhancing resilience against attacks such as fault injection, misconfiguration, and downgrading of security algorithms.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Series
Proceedings of the European Test Symposium, ISSN 1530-1877
Keywords
Monitoring, machine learning, secure boot, security, side-channel analysis
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-374670 (URN)10.1109/ETS63895.2025.11049653 (DOI)001540479400053 ()2-s2.0-105011078897 (Scopus ID)
Conference
2025 European Test Symposium-ETS-Annual, MAY 26-30, 2025, Tallinn, Estonia
Note

Part of ISBN 979-8-3315-9451-0; 979-8-3315-9450-3

QC 20260108

Available from: 2026-01-08 Created: 2026-01-08 Last updated: 2026-01-08Bibliographically approved
Dubrova, E. (2025). Solving AES-SAT Using Side-Channel Hints: A Practical Assessment. In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025: . Paper presented at 55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025 (pp. 147-152). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Solving AES-SAT Using Side-Channel Hints: A Practical Assessment
2025 (English)In: Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 147-152Conference paper, Published paper (Refereed)
Abstract [en]

Side-channel attacks exploit information leaked through non-primary channels, such as power consumption, electromagnetic emissions, or timing, to extract sensitive data from cryptographic devices. Over the past three decades, side-channel analysis has evolved into a mature research field with well-established methodologies for analyzing standard cryptographic algorithms like the Advanced Encryption Standard (AES). However, the integration of side-channel analysis with formal methods remains relatively unexplored. In this paper, we present a hybrid attack on AES that combines side-channel analysis with SAT. We model AES as a SAT problem and leverage hints of the input and output values of the S-boxes, extracted via profiled deep learning-based power analysis, to solve it. Experimental results on an ATXmega128D4 MCU implementation of AES-128 demonstrate that the SAT-assisted approach consistently recovers the full encryption key from a single trace, captured from devices different from those used for profiling, within one hour. In contrast, without SAT assistance, the success rate remains below 80% after 26 hours of key enumeration.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
AES, power analysis, SAT, Side-channel attack
National Category
Computer Sciences Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-368820 (URN)10.1109/ISMVL64713.2025.00036 (DOI)001540510800028 ()2-s2.0-105009322240 (Scopus ID)
Conference
55th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2025, Montreal, Canada, Jun 5 2025 - Jun 6 2025
Note

Part of ISBN 9798331507442

QC 20250902

Available from: 2025-09-02 Created: 2025-09-02 Last updated: 2025-12-08Bibliographically approved
Wang, R. & Dubrova, E. (2024). A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation Algorithm. In: Foundations and Practice of Security - 16th International Symposium, FPS 2023, Revised Selected Papers: . Paper presented at 16th International Symposium on Foundations and Practice of Security, FPS 2023, Bordeaux, France, Dec 11 2023 - Dec 13 2023 (pp. 424-439). Springer Nature
Open this publication in new window or tab >>A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation Algorithm
2024 (English)In: Foundations and Practice of Security - 16th International Symposium, FPS 2023, Revised Selected Papers, Springer Nature , 2024, p. 424-439Conference paper, Published paper (Refereed)
Abstract [en]

In July 2022, NIST selected CRYSTALS-Kyber as a new post-quantum secure public key encryption and key encapsulation mechanism to be standardized. To safeguard its shared and secret keys from side-channel attacks (SCA), countermeasures such as masking and shuffling are applied. However, the existing SCA-protected implementations of CRYSTALS-Kyber protect the decapsulation algorithm only. The encapsulation algorithm is not covered because single-trace shared key recovery attacks on encapsulation are not considered feasible. Since the same shared key is never encapsulated more than once, the attacker gets only a single trace per shared key from the execution of the encapsulation algorithm. In this paper, we demonstrate a practical single-trace shared key recovery attack on a first-order masked implementation of the encapsulation algorithm of Kyber-768 in ARM Cortex-M4 based on deep learning-assisted power analysis. Our main contribution is a new aggregation method for ensemble learning that enables enumeration during shared key recovery. Our experimental results show that a full shared key can be recovered with a 91% probability on average from a single trace captured from a different from profiling device.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Kyber, LWE/LWR-based KEM, Post-quantum cryptography, Public-key cryptography, Side-channel attack
National Category
Computer Engineering
Identifiers
urn:nbn:se:kth:diva-346848 (URN)10.1007/978-3-031-57537-2_26 (DOI)001280331400027 ()2-s2.0-85192540751 (Scopus ID)
Conference
16th International Symposium on Foundations and Practice of Security, FPS 2023, Bordeaux, France, Dec 11 2023 - Dec 13 2023
Note

QC 20240530

Available from: 2024-05-24 Created: 2024-05-24 Last updated: 2025-10-17Bibliographically approved
Wang, R., Brisfors, M. & Dubrova, E. (2024). A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation. In: Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings: . Paper presented at 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, Abu Dhabi, United Arab Emirates, Mar 5 2024 - Mar 8 2024 (pp. 301-324). Springer Nature
Open this publication in new window or tab >>A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation
2024 (English)In: Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings, Springer Nature , 2024, p. 301-324Conference paper, Published paper (Refereed)
Abstract [en]

In response to side-channel attacks on masked implementations of post-quantum cryptographic algorithms, a new bitsliced higher-order masked implementation of CRYSTALS-Kyber has been presented at CHES’2022. The bitsliced implementations are typically more difficult to break by side-channel analysis because they execute a single instruction across multiple bits in parallel. However, in this paper, we reveal new vulnerabilities in the masked Boolean to arithmetic conversion procedure of this implementation that make the shared and secret key recovery possible. We also present a new chosen ciphertext construction method which maximizes secret key recovery probability for a given message bit recovery probability. We demonstrate practical shared and secret key recovery attacks on the first-, second- and third-order masked implementations of Kyber-768 in ARM Cortex-M4 using profiled deep learning-based power analysis.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Kyber, LWE/LWR-based KEM, Post-quantum cryptography, Public-key cryptography, Side-channel attack
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-344819 (URN)10.1007/978-3-031-54776-8_12 (DOI)001206024100012 ()2-s2.0-85187721430 (Scopus ID)
Conference
22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, Abu Dhabi, United Arab Emirates, Mar 5 2024 - Mar 8 2024
Note

QC 20240409

 Part of ISBN 9783031547751

Available from: 2024-03-28 Created: 2024-03-28 Last updated: 2025-12-05Bibliographically approved
Jendral, S., Mattsson, J. P. & Dubrova, E. (2024). A Single-Trace Fault Injection Attack on Hedged Module Lattice Digital Signature Algorithm (ML-DSA). In: Proceedings - 2024 Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2024: . Paper presented at 21st Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2024, Halifax, Canada, September 4, 2024 (pp. 34-43). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A Single-Trace Fault Injection Attack on Hedged Module Lattice Digital Signature Algorithm (ML-DSA)
2024 (English)In: Proceedings - 2024 Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 34-43Conference paper, Published paper (Refereed)
Abstract [en]

Module Lattice Digital Signature Algorithm (MLDSA) is a post-quantum digital signature algorithm currently being standardised by the NIST. Devices making use of MLDSA are expected to soon become generally available in various environments. It is thus important to assess the resistance of ML-DSA implementations to physical attacks. This paper presents a fault injection attack on hedged ML-DSA in ARM Cortex-M4. First, voltage glitching is performed to skip computation of a seed during the generation of the signature. We identified settings that allowed us to consistently skip the necessary function without crashing the device. After the fault injection, the secret key vector s<inf>1</inf> is derived directly from the resulting faulty signature. The attack succeeds in recovering s<inf>1</inf> from a single trace with a probability of around 53%. We also propose countermeasures against the presented attack.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
CRYSTALSDilithium, Digital signature, Dilithium, Fault injection, Key recovery attack, ML-DSA, PQC
National Category
Security, Privacy and Cryptography
Identifiers
urn:nbn:se:kth:diva-367300 (URN)10.1109/FDTC64268.2024.00013 (DOI)001413051800005 ()2-s2.0-85210867422 (Scopus ID)
Conference
21st Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2024, Halifax, Canada, September 4, 2024
Note

Part of ISBN 9798350380361

QC 20250716

Available from: 2025-07-16 Created: 2025-07-16 Last updated: 2025-07-16Bibliographically approved
Jendral, S., Ngo, K., Wang, R. & Dubrova, E. (2024). Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace. In: Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024: . Paper presented at 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, McLean, United States of America, May 6 2024 - May 9 2024 (pp. 70-73). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace
2024 (English)In: Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 70-73Conference paper, Published paper (Refereed)
Abstract [en]

CRYSTALS-Kyber is a post-quantum secure key encapsulation mechanism which is currently being standardized by the NIST. This makes it important to assess the resistance of CRYSTALS-Kyber implementations to physical attacks. In this paper, we present an attack on a masked and shuffled implementation of CRYSTALS-Kyber in ARM Cortex-M4 that combines side-channel analysis (SCA) with fault injection. First, voltage glitching is performed to bypass the shuffling. We found settings that consistently skip the desired instructions without crashing the device. After the successful fault injection, a deep learning-assisted profiled power analysis based on the Hamming weight leakage model is applied to recover the message (shared key). We use a partial key enumeration method that significantly increases the success rate of message recovery. We also propose countermeasures against the presented attack.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
CRYSTALS-Kyber, Fault injection, ML-KEM, Post-quantum cryptography, Side-channel attack
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-348774 (URN)10.1109/HOST55342.2024.10545390 (DOI)001243879400023 ()2-s2.0-85196103145 (Scopus ID)
Conference
2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, McLean, United States of America, May 6 2024 - May 9 2024
Note

QC 20240701

Part of ISBN 979-835037394-3

Available from: 2024-06-27 Created: 2024-06-27 Last updated: 2025-12-05Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-7382-9408

Search in DiVA

Show all publications