Paper 2023/1866
When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber
Abstract
In 2022, NIST selected Kyber and Dilithium as post-quantum cryptographic standard algorithms. The Number Theoretic Transformation (NTT) algorithm, which facilitates polynomial multiplication, has become a primary target for side-channel attacks. In this work, we embed the NTT transformation matrix in Dilithium and Kyber into the SIS search problem, and further, we propose a divide and conquer strategy for dimensionality reduction of the SIS problem by utilizing the properties of NTT, and discuss the effectiveness of the BKZ algorithm for solving the problem by using the LLL and with different blocksize, respectively. When using BKZ-60, the time required to recover private keys
Note: We will continue to revise the work
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Number Theoretic TransformationSide-channel AttacksShort Integer SolutionDilithiumKyber
- Contact author(s)
-
qiaozehua @ iie ac cn
liuyuejun @ njust edu cn
shaomingyao @ iie ac cn - History
- 2024-07-01: last of 2 revisions
- 2023-12-05: received
- See all versions
- Short URL
- https://ia.cr/2023/1866
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/1866, author = {Zehua Qiao and Yuejun Liu and Yongbin Zhou and Mingyao Shao and Shuo Sun}, title = {When {NTT} Meets {SIS}: Efficient Side-channel Attacks on Dilithium and Kyber}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1866}, year = {2023}, url = {https://eprint.iacr.org/2023/1866} }