Paper 2021/1311

Power analysis attack on Kyber

Alexandre Karlov and Natacha Linard de Guertechin

Abstract

This paper describes a practical side-channel power analysis on CRYSTALS-Kyber key-encapsulation mechanism. In particular, we analyse the polynomial multiplication in the decapsulation phase to recover the secret key in a semi-static setting. The power analysis attack was performed against the KYBER512 implementation from pqm4 running on STM32F3 M4-cortex CPU.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. Minor revision.
Keywords
Kyberlattice-based cryptographyside-channel attackscorrelation power analysis
Contact author(s)
alexandre karlov @ cysec com
History
2021-09-28: received
Short URL
https://ia.cr/2021/1311
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1311,
      author = {Alexandre Karlov and Natacha Linard de Guertechin},
      title = {Power analysis attack on Kyber},
      howpublished = {Cryptology ePrint Archive, Paper 2021/1311},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/1311}},
      url = {https://eprint.iacr.org/2021/1311}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.