Paper 2021/874

Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction

Bo-Yeon Sim
Aesun Park
Dong-Guk Han
Abstract

This study proposes a chosen-ciphertext side-channel attack against a lattice-based key encapsulation mechanism (KEM), the third-round candidate of the national institute of standards and technology (NIST) standardization project. Unlike existing attacks that target operations such as inverse NTT and message encoding/decoding, we target Barrett Reduction in the decapsulation phase of CRYSTALS-KYBER to obtain a secret key. We show that a sensitive variable-dependent leakage of Barrett Reduction exposes an entire secret key. The results of experiments conducted on the ARM Cortex-M4 microcontroller accomplish a success rate of 100%. We only need six chosen ciphertexts for KYBER512 and KYBER768 and eight chosen ciphertexts for KYBER1024. We also show that the m4 scheme of the pqm4 library, an implementation with the ARM Cortex-M4 specific optimization (typically in assembly), is vulnerable to the proposed attack. In this scheme, six, nine, and twelve chosen ciphertexts are required for KYBER512, KYBER768, and KYBER1024, respectively.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. IEEE Internet of Things Journal
Keywords
Lattice-based cryptography key decapsulation mechanism Barrett reduction side-channel attack chosen-ciphertext attack
Contact author(s)
sboyeon37 @ etri re kr
History
2022-06-13: last of 3 revisions
2021-06-29: received
See all versions
Short URL
https://ia.cr/2021/874
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/874,
      author = {Bo-Yeon Sim and Aesun Park and Dong-Guk Han},
      title = {Chosen-ciphertext Clustering Attack on {CRYSTALS}-{KYBER} using the Side-channel Leakage of Barrett Reduction},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/874},
      year = {2021},
      url = {https://eprint.iacr.org/2021/874}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.