Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption

In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in post-quantum cryptography, some works have developed low-cost detection-based countermeasures. These countermeasures try to detect maliciously generated input ciphertexts and react to them by discar...

Full description

Bibliographic Details
Main Authors: Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D’Anvers, Shivam Bhasin
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2024-03-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/11447
_version_ 1797262218410065920
author Prasanna Ravi
Thales Paiva
Dirmanto Jap
Jan-Pieter D’Anvers
Shivam Bhasin
author_facet Prasanna Ravi
Thales Paiva
Dirmanto Jap
Jan-Pieter D’Anvers
Shivam Bhasin
author_sort Prasanna Ravi
collection DOAJ
description In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in post-quantum cryptography, some works have developed low-cost detection-based countermeasures. These countermeasures try to detect maliciously generated input ciphertexts and react to them by discarding the ciphertext or secret key. In this work, we take a look at two previously proposed low-cost countermeasures: the ciphertext sanity check and the decapsulation failure check, and demonstrate successful attacks on these schemes. We show that the first countermeasure can be broken with little to no overhead, while the second countermeasure requires a more elaborate attack strategy that relies on valid chosen ciphertexts. Thus, in this work, we propose the first chosen-ciphertext based side-channel attack that only relies on valid ciphertexts for key recovery. As part of this attack, a third contribution of our paper is an improved solver that retrieves the secret key from linear inequalities constructed using side-channel leakage from the decryption procedure. Our solver is an improvement over the state-of-the-art Belief Propagation solvers by Pessl and Prokop, and later Delvaux. Our method is simpler, easier to understand and has lower computational complexity, while needing less than half the inequalities compared to previous methods.
first_indexed 2024-04-24T23:53:37Z
format Article
id doaj.art-071439e967aa4c0b8a193bfb85a899e7
institution Directory Open Access Journal
issn 2569-2925
language English
last_indexed 2024-04-24T23:53:37Z
publishDate 2024-03-01
publisher Ruhr-Universität Bochum
record_format Article
series Transactions on Cryptographic Hardware and Embedded Systems
spelling doaj.art-071439e967aa4c0b8a193bfb85a899e72024-03-14T16:24:43ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252024-03-012024210.46586/tches.v2024.i2.795-818Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based EncryptionPrasanna Ravi0Thales Paiva1Dirmanto Jap2Jan-Pieter D’Anvers3Shivam Bhasin4Temasek Laboratories, Nanyang Technological University, Singapore, SingaporeFundep, Belo Horizonte, Brazil; CASNAV, Rio de Janeiro, BrazilTemasek Laboratories, Nanyang Technological University, Singapore, Singaporeimec-COSIC KU Leuven, Kasteelpark Arenberg 10 - bus 2452, 3001 Leuven, BelgiumTemasek Laboratories, Nanyang Technological University, Singapore, Singapore In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in post-quantum cryptography, some works have developed low-cost detection-based countermeasures. These countermeasures try to detect maliciously generated input ciphertexts and react to them by discarding the ciphertext or secret key. In this work, we take a look at two previously proposed low-cost countermeasures: the ciphertext sanity check and the decapsulation failure check, and demonstrate successful attacks on these schemes. We show that the first countermeasure can be broken with little to no overhead, while the second countermeasure requires a more elaborate attack strategy that relies on valid chosen ciphertexts. Thus, in this work, we propose the first chosen-ciphertext based side-channel attack that only relies on valid ciphertexts for key recovery. As part of this attack, a third contribution of our paper is an improved solver that retrieves the secret key from linear inequalities constructed using side-channel leakage from the decryption procedure. Our solver is an improvement over the state-of-the-art Belief Propagation solvers by Pessl and Prokop, and later Delvaux. Our method is simpler, easier to understand and has lower computational complexity, while needing less than half the inequalities compared to previous methods. https://tches.iacr.org/index.php/TCHES/article/view/11447Lattice-based cryptographySide-Channel AttackKyberKey Encapsulation MechanismChosen Ciphertext Attack
spellingShingle Prasanna Ravi
Thales Paiva
Dirmanto Jap
Jan-Pieter D’Anvers
Shivam Bhasin
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
Transactions on Cryptographic Hardware and Embedded Systems
Lattice-based cryptography
Side-Channel Attack
Kyber
Key Encapsulation Mechanism
Chosen Ciphertext Attack
title Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
title_full Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
title_fullStr Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
title_full_unstemmed Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
title_short Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
title_sort defeating low cost countermeasures against side channel attacks in lattice based encryption
topic Lattice-based cryptography
Side-Channel Attack
Kyber
Key Encapsulation Mechanism
Chosen Ciphertext Attack
url https://tches.iacr.org/index.php/TCHES/article/view/11447
work_keys_str_mv AT prasannaravi defeatinglowcostcountermeasuresagainstsidechannelattacksinlatticebasedencryption
AT thalespaiva defeatinglowcostcountermeasuresagainstsidechannelattacksinlatticebasedencryption
AT dirmantojap defeatinglowcostcountermeasuresagainstsidechannelattacksinlatticebasedencryption
AT janpieterdanvers defeatinglowcostcountermeasuresagainstsidechannelattacksinlatticebasedencryption
AT shivambhasin defeatinglowcostcountermeasuresagainstsidechannelattacksinlatticebasedencryption