Correction Fault Attacks on Randomized CRYSTALS-Dilithium

After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices. Concretely, there are still many open questions regarding...

Descrizione completa

Dettagli Bibliografici
Autori principali: Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu
Natura: Articolo
Lingua:English
Pubblicazione: Ruhr-Universität Bochum 2024-07-01
Serie:Transactions on Cryptographic Hardware and Embedded Systems
Soggetti:
Accesso online:https://tches.iacr.org/index.php/TCHES/article/view/11673
_version_ 1827173944251121664
author Elisabeth Krahmer
Peter Pessl
Georg Land
Tim Güneysu
author_facet Elisabeth Krahmer
Peter Pessl
Georg Land
Tim Güneysu
author_sort Elisabeth Krahmer
collection DOAJ
description After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices. Concretely, there are still many open questions regarding the susceptibility of Dilithium to fault attacks. This is especially the case for Dilithium’s randomized (or hedged) signing mode, which, likely due to devastating implementation attacks on the deterministic mode, was selected as the default by NIST. This work takes steps towards closing this gap by presenting two new key-recovery fault attacks on randomized/hedged Dilithium. Both attacks are based on the idea< of correcting faulty signatures after signing. A successful correction yields the value of a secret intermediate that carries information on the key. After gathering many faulty signatures and corresponding correction values, it is possible to solve for the signing key via either simple linear algebra or lattice-reduction techniques. Our first attack extends a previously published attack based on an instruction-skipping fault to the randomized setting. Our second attack injects faults in the matrix A, which is part of the public key. As such, it is not sensitive to side-channel leakage and has, potentially for this reason, not seen prior analysis regarding faults. We show that for Dilithium2, the attacks allow key recovery with as little as 1024 and 512 faulty signatures, with each signature generated by injecting a single targeted fault. We also demonstrate how our attacks can be adapted to circumvent several popular fault countermeasures with a moderate increase in the computational runtime and the number of required faulty signatures. These results are verified using both simulated faults and clock glitches on an ARM-based standard microcontroller. The presented attacks demonstrate that also randomized Dilithium can be subject to diverse fault attacks, that certain countermeasures might be easily bypassed, and that potential fault targets reach beyond side-channel sensitive operations. Still, many further operations are likely also susceptible, implying the need for increased analysis efforts in the future.
first_indexed 2025-03-21T03:47:42Z
format Article
id doaj.art-b9e32f1a55b34d97b8dcc44b39abcdf3
institution Directory Open Access Journal
issn 2569-2925
language English
last_indexed 2025-03-21T03:47:42Z
publishDate 2024-07-01
publisher Ruhr-Universität Bochum
record_format Article
series Transactions on Cryptographic Hardware and Embedded Systems
spelling doaj.art-b9e32f1a55b34d97b8dcc44b39abcdf32024-07-30T16:39:29ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252024-07-012024310.46586/tches.v2024.i3.174-199Correction Fault Attacks on Randomized CRYSTALS-DilithiumElisabeth Krahmer0Peter Pessl1Georg Land2Tim Güneysu3Ruhr-University Bochum, Bochum, Germany; Infineon Technologies AG, Munich, GermanyInfineon Technologies AG, Munich, GermanyRuhr University Bochum, Bochum, GermanyRuhr University Bochum, Bochum, Germany; DFKI, Bremen, Germany After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices. Concretely, there are still many open questions regarding the susceptibility of Dilithium to fault attacks. This is especially the case for Dilithium’s randomized (or hedged) signing mode, which, likely due to devastating implementation attacks on the deterministic mode, was selected as the default by NIST. This work takes steps towards closing this gap by presenting two new key-recovery fault attacks on randomized/hedged Dilithium. Both attacks are based on the idea< of correcting faulty signatures after signing. A successful correction yields the value of a secret intermediate that carries information on the key. After gathering many faulty signatures and corresponding correction values, it is possible to solve for the signing key via either simple linear algebra or lattice-reduction techniques. Our first attack extends a previously published attack based on an instruction-skipping fault to the randomized setting. Our second attack injects faults in the matrix A, which is part of the public key. As such, it is not sensitive to side-channel leakage and has, potentially for this reason, not seen prior analysis regarding faults. We show that for Dilithium2, the attacks allow key recovery with as little as 1024 and 512 faulty signatures, with each signature generated by injecting a single targeted fault. We also demonstrate how our attacks can be adapted to circumvent several popular fault countermeasures with a moderate increase in the computational runtime and the number of required faulty signatures. These results are verified using both simulated faults and clock glitches on an ARM-based standard microcontroller. The presented attacks demonstrate that also randomized Dilithium can be subject to diverse fault attacks, that certain countermeasures might be easily bypassed, and that potential fault targets reach beyond side-channel sensitive operations. Still, many further operations are likely also susceptible, implying the need for increased analysis efforts in the future. https://tches.iacr.org/index.php/TCHES/article/view/11673Fault Injection AttackDilithiumPost-Quantum Cryptography
spellingShingle Elisabeth Krahmer
Peter Pessl
Georg Land
Tim Güneysu
Correction Fault Attacks on Randomized CRYSTALS-Dilithium
Transactions on Cryptographic Hardware and Embedded Systems
Fault Injection Attack
Dilithium
Post-Quantum Cryptography
title Correction Fault Attacks on Randomized CRYSTALS-Dilithium
title_full Correction Fault Attacks on Randomized CRYSTALS-Dilithium
title_fullStr Correction Fault Attacks on Randomized CRYSTALS-Dilithium
title_full_unstemmed Correction Fault Attacks on Randomized CRYSTALS-Dilithium
title_short Correction Fault Attacks on Randomized CRYSTALS-Dilithium
title_sort correction fault attacks on randomized crystals dilithium
topic Fault Injection Attack
Dilithium
Post-Quantum Cryptography
url https://tches.iacr.org/index.php/TCHES/article/view/11673
work_keys_str_mv AT elisabethkrahmer correctionfaultattacksonrandomizedcrystalsdilithium
AT peterpessl correctionfaultattacksonrandomizedcrystalsdilithium
AT georgland correctionfaultattacksonrandomizedcrystalsdilithium
AT timguneysu correctionfaultattacksonrandomizedcrystalsdilithium