Paper 2022/1722
On Side-Channel and CVO Attacks against TFHE and FHEW
Abstract
The recent work of Chaturvedi et al. (ePrint 2022/685) claims to observe leakage about secret information in a ciphertext of TFHE through a timing side-channel on the (untrusted) server. In (Chaturvedi et al., ePrint 2022/1563) this is combined with an active attack against TFHE and FHEW. The claims in (Chaturvedi et al., ePrint 2022/685) about the non-trivial leakage from a ciphertext would have far-reaching implications, since the server does not have any secret inputs. In particular, this would mean a weakening of LWE in general, since an adversary could always simulate a server on which there is side channel leakage. In this short note, we show that the claims made in the two aforementioned works with regards to the leakage through the timing side channel are false. We demonstrate that the active attack, a standard attack against IND-CPA secure LWE-based encryption, can be mounted just as efficiently without the "side channel information".
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- TFHE FHEW side-channel analysis
- Contact author(s)
- michael walter @ zama ai
- History
- 2022-12-14: revised
- 2022-12-14: received
- See all versions
- Short URL
- https://ia.cr/2022/1722
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1722, author = {Michael Walter}, title = {On Side-Channel and {CVO} Attacks against {TFHE} and {FHEW}}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1722}, year = {2022}, url = {https://eprint.iacr.org/2022/1722} }