Paper 2020/971

QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme

Koksal Mus, Saad Islam, and Berk Sunar

Abstract

Post-quantum schemes are expected to replace existing public-key schemes within a decade in billions of devices. To facilitate the transition, the US National Institute for Standards and Technology (NIST) is running a standardization process. Multivariate signatures is one of the main categories in NIST's post-quantum cryptography competition. Among the four candidates in this category, the LUOV and Rainbow schemes are based on the Oil and Vinegar scheme, first introduced in 1997 which has withstood over two decades of cryptanalysis. Beyond mathematical security and efficiency, security against side-channel attacks is a major concern in the competition. The current sentiment is that post-quantum schemes may be more resistant to fault-injection attacks due to their large key sizes and the lack of algebraic structure. We show that this is not true. We introduce a novel hybrid attack, QuantumHammer, and demonstrate it on the constant-time implementation of LUOV currently in Round 2 of the NIST post-quantum competition. The QuantumHammer attack is a combination of two attacks, a bit-tracing attack enabled via Rowhammer fault injection and a divide and conquer attack that uses bit-tracing as an oracle. Using bit-tracing, an attacker with access to faulty signatures collected using Rowhammer attack, can recover secret key bits albeit slowly. We employ a divide and conquer attack which exploits the structure in the key generation part of LUOV and solves the system of equations for the secret key more efficiently with few key bits recovered via bit-tracing. We have demonstrated the first successful in-the-wild attack on LUOV recovering all 11K key bits with less than 4 hours of an active Rowhammer attack. The post-processing part is highly parallel and thus can be trivially sped up using modest resources. QuantumHammer does not make any unrealistic assumptions, only requires software co-location (no physical access), and therefore can be used to target shared cloud servers or in other sandboxed environments.

Note: Doi is updated.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Minor revision. CCS '20
DOI
10.1145/3372297.3417272
Keywords
Rowhammer attackfault attackspost-quantum cryptographymultivariate cryptographyalgebraic attack
Contact author(s)
koksalmus @ gmail com
History
2020-08-18: received
Short URL
https://ia.cr/2020/971
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/971,
      author = {Koksal Mus and Saad Islam and Berk Sunar},
      title = {QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme},
      howpublished = {Cryptology ePrint Archive, Paper 2020/971},
      year = {2020},
      doi = {10.1145/3372297.3417272},
      note = {\url{https://eprint.iacr.org/2020/971}},
      url = {https://eprint.iacr.org/2020/971}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.