Paper 2023/1545
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium
Abstract
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full recovery attack. The methodology is composed of two steps. The first step consists of observing or inserting a bias in the posterior distribution of sensitive variables. The second step of an information processing phase which is based on belief propagation, which allows effectively exploiting that bias. The proposed concrete attacks rely on side-channel information, injection of fault attacks, or a combination of the two. Interestingly, the adversary benefits from the knowledge on the released signature, but is not dependent on it. We show that the combination of a physical attack with the binary knowledge of acceptance or rejection of a signature also leads to exploitable information on the secret key. Finally, we demonstrate that this approach is also effective against shuffled implementations of CRYSTALS-Dilithium.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Published by the IACR in TCHES 2024
- Keywords
- Post-Quantum CryptographySide-Channel AttacksFault AttacksCRYSTALS-Dilithium
- Contact author(s)
-
olivier bronchain @ nxp com
melissa azouaoui @ nxp com
mohamed elghamrawy @ nxp com
joost renes @ nxp com
tobias schneider @ nxp com - History
- 2024-01-16: revised
- 2023-10-09: received
- See all versions
- Short URL
- https://ia.cr/2023/1545
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/1545, author = {Olivier Bronchain and Melissa Azouaoui and Mohamed ElGhamrawy and Joost Renes and Tobias Schneider}, title = {Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to {CRYSTALS}-Dilithium}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1545}, year = {2023}, url = {https://eprint.iacr.org/2023/1545} }