Paper 2023/1220

Securing Lattice-Based KEMs with Code-Based Masking: A Theoretical Approach

Pierre-Augustin Berthet, Télécom Paris, Hensoldt SAS France
Cédric Tavernier, Hensoldt SAS France
Jean-Luc Danger, Télécom Paris
Laurent Sauvage, Télécom Paris
Abstract

The recent technological advances in Post-Quantum Cryptography (PQC) raise the questions of robust implementations of new asymmetric cryptographic primitives in today’s technology. This is the case for the lattice-based Module Lattice-Key Encapsulation Mechanism (ML-KEM) algorithm which is proposed by the NIST as the first standard for Public Key Encryption (PKE) and Key Encapsulation Mechanism (KEM), taking inspiration from CRYSTALS-Kyber. We have notably to make sure the ML-KEM implementation is resilient against physical attacks like Side-Channel Analysis (SCA) and Fault Injection Attacks (FIA). To reach this goal, we propose to adapt a masking countermeasure, more precisely the generic Direct Sum Masking method (DSM). By taking inspiration of a previous paper on AES, we extend the method to finite fields of characteristic prime other than 2 and even-length codes. We also briefly investigate its application to Keccak, which is the hash-based function used in ML-KEM. We provide the first masked implementation of ML-KEM with both SCA and FIA resilience while not relying on any conversion between different masking methods. Our FIA resilience allows for fault correction even within the multiplicative gadget. Finally, we adapt a polynomial evaluation method to compute masked polynomials with public coefficients over finite fields of characteristic different from 2.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
Post-Quantum CryptograpyML-KEMSide Channel AnalysisFault Injection AttackMaskingCode Based Masking
Contact author(s)
berthet @ telecom-paris fr
cedric tavernier @ hensoldt net
jean-luc danger @ telecom-paris fr
laurent sauvage @ telecom-paris fr
History
2024-02-12: revised
2023-08-11: received
See all versions
Short URL
https://ia.cr/2023/1220
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1220,
      author = {Pierre-Augustin Berthet and Cédric Tavernier and Jean-Luc Danger and Laurent Sauvage},
      title = {Securing Lattice-Based KEMs with Code-Based Masking: A Theoretical Approach},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1220},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/1220}},
      url = {https://eprint.iacr.org/2023/1220}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.