Pushing the limits of generic side-channel attacks on LWE-based KEMs-parallel PC oracle attacks on Kyber KEM and beyond

G Rajendran, P Ravi, JP D'anvers, S Bhasin… - IACR Transactions on …, 2023 - dr.ntu.edu.sg
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking
(PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen …

Sca-ldpc: A code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes

Q Guo, D Nabokov, A Nilsson, T Johansson - International Conference on …, 2023 - Springer
Whereas theoretical attacks on standardized cryptographic primitives rarely lead to actual
practical attacks, the situation is different for side-channel attacks. Improvements in the …

Do not bound to a single position: near-optimal multi-positional mismatch attacks against Kyber and Saber

Q Guo, E Mårtensson - International Conference on Post-Quantum …, 2023 - Springer
The ephemeral-key setting of a lattice-based Key Encapsulation Mechanism (KEM) scheme
assumes critical importance when considering certain advanced functionalities, such as …

Towards High-Performance Supersingular Isogeny Cryptographic Hardware Accelerator Design

G Su, G Bai - Electronics, 2023 - mdpi.com
Cryptosystems based on supersingular isogeny are a novel tool in post-quantum
cryptography. One compelling characteristic is their concise keys and ciphertexts. However …

Defeating low-cost countermeasures against side-channel attacks in lattice-based encryption

P Ravi, T Paiva, D Jap, JP D'anvers… - IACR Transactions on …, 2024 - dr.ntu.edu.sg
In an effort to circumvent the high cost of standard countermeasures against side-channel
attacks in post-quantum cryptography, some works have de-veloped low-cost detection …

Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks

A Ito, R Ueno, R Tanaka, N Homma - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This paper formally analyzes two major non-profiled deep-learning-based side-channel
attacks (DL-SCAs): differential deep-learning analysis (DDLA) by Timon and collision DL …

Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs

T Yu, C Cheng, Z Yang, Y Wang, Y Pan… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Number Theoretic Transform (NTT) has been widely used in accelerating
computations in lattice-based cryptography. However, attackers can potentially launch …

The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber

Q Guo, E Mårtensson, A Åström - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In this paper, we study the robustness of Kyber, the Learning With Errors (LWE)-based Key
Encapsulation Mechanism (KEM) chosen for standardization by NIST, against key mismatch …

CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis

A Liu, A Wang, S Sun, C Wei, Y Ding… - Cryptology ePrint …, 2024 - eprint.iacr.org
Side-channel analysis based on machine learning, especially neural networks, has gained
significant attention in recent years. However, many existing methods still suffer from certain …

[PDF][PDF] 一种针对格基后量子密码的能量侧信道分析框架

胡伟, 袁超绚, 郑健, 王省欣, 李倍倍, 唐时博 - 电子与信息学报, 2023 - jeit.ac.cn
为应对量子计算对传统公钥密码的安全威胁, 后量子密码(PQC) 已逐渐成为新一代密码技术.
虽然后量子密码通过数学理论保证了算法的安全性, 但在密码实现运算过程中易发生侧信道信息 …