A side-channel attack on a masked IND-CCA secure saber KEM implementation

Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson

Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskriftPeer review

Sammanfattning

In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long-term secret key from 24 traces using a deep neural network created at the profiling stage. The proposed message recovery approach learns a higher-order model directly, without explicitly extracting random masks at each execution. This eliminates the need for a fully controllable profiling device which is required in previous attacks on masked implementations of LWE/LWR-based PKEs/KEMs. We also present a new secret key recovery approach based on maps from error-correcting codes that can compensate for some errors in the recovered message. In addition, we discovered a previously unknown leakage point in the primitive for masked logical shifting on arithmetic shares.

Originalspråkengelska
Sidor (från-till)676-707
TidskriftIACR Transactions on Cryptographic Hardware and Embedded Systems
Volym2021
Nummer4
DOI
StatusPublished - 2021

Bibliografisk information

Publisher Copyright:
© 2021, Ruhr-University of Bochum. All rights reserved.

Ämnesklassifikation (UKÄ)

  • Datavetenskap (Datalogi)

Fingeravtryck

Utforska forskningsämnen för ”A side-channel attack on a masked IND-CCA secure saber KEM implementation”. Tillsammans bildar de ett unikt fingeravtryck.

Citera det här