Projects per year
Abstract
In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long-term secret key from 24 traces using a deep neural network created at the profiling stage. The proposed message recovery approach learns a higher-order model directly, without explicitly extracting random masks at each execution. This eliminates the need for a fully controllable profiling device which is required in previous attacks on masked implementations of LWE/LWR-based PKEs/KEMs. We also present a new secret key recovery approach based on maps from error-correcting codes that can compensate for some errors in the recovered message. In addition, we discovered a previously unknown leakage point in the primitive for masked logical shifting on arithmetic shares.
Original language | English |
---|---|
Pages (from-to) | 676-707 |
Journal | IACR Transactions on Cryptographic Hardware and Embedded Systems |
Volume | 2021 |
Issue number | 4 |
DOIs | |
Publication status | Published - 2021 |
Subject classification (UKÄ)
- Computer Sciences
Free keywords
- Deep learning
- LWE/LWR-based KEM
- Post-quantum cryptography
- Power analysis
- Public-key cryptography
- Saber KEM
- Side-channel attack
Fingerprint
Dive into the research topics of 'A side-channel attack on a masked IND-CCA secure saber KEM implementation'. Together they form a unique fingerprint.Projects
- 1 Finished
-
Lightweight Cryptography for Autonomous Vehicles
Johansson, T. (Researcher) & Guo, Q. (Researcher)
2020/08/01 → 2023/12/31
Project: Research