Projekt per år
Sammanfattning
In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long-term secret key from 24 traces using a deep neural network created at the profiling stage. The proposed message recovery approach learns a higher-order model directly, without explicitly extracting random masks at each execution. This eliminates the need for a fully controllable profiling device which is required in previous attacks on masked implementations of LWE/LWR-based PKEs/KEMs. We also present a new secret key recovery approach based on maps from error-correcting codes that can compensate for some errors in the recovered message. In addition, we discovered a previously unknown leakage point in the primitive for masked logical shifting on arithmetic shares.
Originalspråk | engelska |
---|---|
Sidor (från-till) | 676-707 |
Tidskrift | IACR Transactions on Cryptographic Hardware and Embedded Systems |
Volym | 2021 |
Nummer | 4 |
DOI | |
Status | Published - 2021 |
Bibliografisk information
Publisher Copyright:© 2021, Ruhr-University of Bochum. All rights reserved.
Ämnesklassifikation (UKÄ)
- Datavetenskap (Datalogi)
Fingeravtryck
Utforska forskningsämnen för ”A side-channel attack on a masked IND-CCA secure saber KEM implementation”. Tillsammans bildar de ett unikt fingeravtryck.Projekt
- 1 Avslutade
-
Lightweight Cryptography for Autonomous Vehicles
Johansson, T. (Forskare) & Guo, Q. (Forskare)
2020/08/01 → 2023/12/31
Projekt: Forskning