Paper 2021/1622
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
Abstract
At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack against Kyber in which a system of linear inequalities over the private key is generated and solved. The attack requires a laser and is, understandably, demonstrated with simulations—not actual equipment. We facilitate and diversify the attack in four ways, thereby admitting cheaper and more forgiving fault-injection setups. Firstly, the attack surface is enlarged: originally, the two input operands of the ciphertext comparison are covered, and we additionally cover re-encryption modules such as binomial sampling and butterflies in the last layer of the inverse number-theoretic transform (INTT). This extra surface also allows an attacker to bypass the custom countermeasure that was proposed in the Indocrypt paper. Secondly, the fault model is relaxed: originally, precise bit flips are required, and we additionally support set-to-0 faults, random faults, arbitrary bit flips, and instruction skips. Thirdly, masking and blinding methods that randomize intermediate variables kindly help our attack, whereas the IndoCrypt attack is like most other fault attacks either hindered or unaltered by countermeasures against passive side-channel analysis (SCA). Randomization helps because we randomly fault intermediate prime-field elements until a desired set of values is hit. If these prime-field elements are represented on a circle, which is a common visualization, our attack is analogous to spinning a roulette wheel until the ball lands in a desired set of pockets. Hence, the nickname. Fourthly, we accelerate and improve the error tolerance of solving the system of linear inequalities: run times of roughly 100 minutes are reduced to roughly one minute, and inequality error rates of roughly 1% are relaxed to roughly 25%. Benefiting from the four advances above, we use a reasonably priced ChipWhisperer board to break a masked implementation of Kyber running on an ARM Cortex-M4 through clock glitching.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint.
- Keywords
- Fault Attack Kyber Key-Encapsulation Mechanism Lattice-Based Cryptography Post-Quantum Cryptography
- Contact author(s)
- jeroen delvaux @ tii ae
- History
- 2022-08-08: last of 3 revisions
- 2021-12-14: received
- See all versions
- Short URL
- https://ia.cr/2021/1622
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/1622, author = {Jeroen Delvaux}, title = {Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/1622}, year = {2021}, url = {https://eprint.iacr.org/2021/1622} }