Single-trace attack on NIST round 3 candidate Dilithium using machine learning-based profiling

J Han, T Lee, J Kwon, J Lee, IJ Kim, J Cho… - IEEE …, 2021 - ieeexplore.ieee.org
J Han, T Lee, J Kwon, J Lee, IJ Kim, J Cho, DG Han, BY Sim
IEEE Access, 2021ieeexplore.ieee.org
In this paper, we propose single-trace side-channel attacks against. is a lattice-based digital
signature algorithm, one of the third round finalists of the national institute of standards and
technology (NIST) standardization project. We attack the number-theoretic transform (NTT)
in the signing procedure and key generation of to obtain a secret key. When targeting the
signing procedure, we can recover both secret key vectors and. This enables forgery of
signatures. However, only the secret key vector can be recovered when targeting the key …
In this paper, we propose single-trace side-channel attacks against . is a lattice-based digital signature algorithm, one of the third round finalists of the national institute of standards and technology (NIST) standardization project. We attack the number-theoretic transform (NTT) in the signing procedure and key generation of to obtain a secret key. When targeting the signing procedure, we can recover both secret key vectors and . This enables forgery of signatures. However, only the secret key vector can be recovered when targeting the key generation. Thus, we additionally attack four operations, sampling, addition, rounding, and packing, to find . We applied a machine learning-based profiling attack method to find the secret key vectors and with a single trace.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果