A side-channel attack on a masked IND-CCA secure saber KEM implementation

Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long-term secret key from 24 traces using a deep neural network created at the profiling stage. The proposed message recovery approach learns a higher-order model directly, without explicitly extracting random masks at each execution. This eliminates the need for a fully controllable profiling device which is required in previous attacks on masked implementations of LWE/LWR-based PKEs/KEMs. We also present a new secret key recovery approach based on maps from error-correcting codes that can compensate for some errors in the recovered message. In addition, we discovered a previously unknown leakage point in the primitive for masked logical shifting on arithmetic shares.

Original languageEnglish
Pages (from-to)676-707
JournalIACR Transactions on Cryptographic Hardware and Embedded Systems
Volume2021
Issue number4
DOIs
Publication statusPublished - 2021

Subject classification (UKÄ)

  • Computer Sciences

Free keywords

  • Deep learning
  • LWE/LWR-based KEM
  • Post-quantum cryptography
  • Power analysis
  • Public-key cryptography
  • Saber KEM
  • Side-channel attack

Fingerprint

Dive into the research topics of 'A side-channel attack on a masked IND-CCA secure saber KEM implementation'. Together they form a unique fingerprint.

Cite this