Paper 2021/790

A Side-Channel Assisted Attack on NTRU

Amund Askeland and Sondre Rønjom

Abstract

We take a look at the current implementation of NTRU submitted to the NIST post-quantum standardization project, and identify two strong sources of leakage in the unpacking of the secret key. The strength of the leakages is due to the target processor handling data with very different Hamming weight depending on parts of the secret key. We focus on using only these strong leakages, present a single-trace side-channel attack that reliably recovers a large portion of the secret key, and use lattice reduction techniques to find the remaining parts. Further, we show how small changes to the implementation greatly reduces the leakage without any overhead.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. NIST PQC conference: https://csrc.nist.gov/CSRC/media/Events/third-pqc-standardization-conference/documents/accepted-papers/askeland-sid-channel-pqc2021.pdf
Keywords
Post-Quantum CryptographyNTRUSide-channel AttackPower Analysis
Contact author(s)
amund askeland @ uib no
History
2021-06-14: received
Short URL
https://ia.cr/2021/790
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/790,
      author = {Amund Askeland and Sondre Rønjom},
      title = {A Side-Channel Assisted Attack on {NTRU}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/790},
      year = {2021},
      url = {https://eprint.iacr.org/2021/790}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.