Paper 2023/1891

In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium

Huaxin Wang, Nanjing University of Science and Technology
Yiwen Gao, Nanjing University of Science and Technology
Yuejun Liu, Nanjing University of Science and Technology
Qian Zhang, Institute of Information Engineering, CAS
Yongbin Zhou, Nanjing University of Science and Technology
Abstract

During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the recommended lattice signature scheme, CRYSTALS-Dilithium, when implemented on hardware, has only been subjected to the side-channel attack presented by Steffen et al. in IACR ePrint 2022. This attack is not complete and requires excessive traces. Therefore, we investigate the leakage of an FPGA (Kintex7) implementation of CRYSTALS-Dilithium using the CPA method, where with a minimum of 70000 traces partial private key coefficients can be recovered. As far as we know, this is the first work that applies power leakage to sidechannel attacks on FPGA implementations of CRYSTALS-Dilithium. Furthermore, we optimise the attack by extracting Point-of-Interests using known information due to parallelism (named CPA-PoI) and by iteratively utilising parallel leakages (named CPA-ITR). We experimentally demonstrate that when recovering the same number of key coefficients, the CPA-PoI and CPA-ITR reduce the number of traces used by up to 16.67 percent and 25 percent, respectively, compared to the CPA method. When attacking with the same number of traces, the CPA-PoI method and the CPA-ITR method increase the number of recovered key coefficients by up to 55.17 percent and 93.10 percent, respectively, compared to the CPA method. Our experiments confirm that the FPGA implementation of CRYSTALS-Dilithium is also very vulnerable to side-channel analysis.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
CRYSTALS-DilithiumPower Analysis AttackFPGASide-Channel AttackPost-Quantum Cryptography
Contact author(s)
wanghuaxin @ njust edu cn
gaoywin @ gmail com
liuyuejun @ njust edu cn
zhangqian @ iie ac cn
zhouyongbin @ njust edu cn
History
2023-12-11: approved
2023-12-08: received
See all versions
Short URL
https://ia.cr/2023/1891
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2023/1891,
      author = {Huaxin Wang and Yiwen Gao and Yuejun Liu and Qian Zhang and Yongbin Zhou},
      title = {In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1891},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/1891}},
      url = {https://eprint.iacr.org/2023/1891}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.