Paper 2022/916
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Abstract
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention. In particular, it has been shown that some post-quantum Key Encapsulation Mechanisms (KEMs) are vulnerable to Chosen-Ciphertext Side-Channel Attacks (CC-SCA). These powerful attacks target the re-encryption step in the Fujisaki-Okamoto (FO) transform, which is commonly used to achieve CCA security in such schemes. To sufficiently protect PQC KEMs on embedded devices against such a powerful CC-SCA, masking at increasingly higher order is required, which induces a considerable overhead. In this work, we propose to use a conceptually simple construction, the
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published by the IACR in TCHES 2022
- Keywords
- Post-Quantum Cryptography Side-Channel Attacks Chosen-Ciphertext Attacks Authenticated Key Exchange
- Contact author(s)
-
melissa azouaoui @ nxp com
yulia kuzovkova_2 @ nxp com
tobias schneider @ nxp com
christine cloostermans @ nxp com - History
- 2022-07-25: revised
- 2022-07-14: received
- See all versions
- Short URL
- https://ia.cr/2022/916
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/916, author = {Melissa Azouaoui and Yulia Kuzovkova and Tobias Schneider and Christine van Vredendaal}, title = {Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/916}, year = {2022}, url = {https://eprint.iacr.org/2022/916} }