Paper 2023/224
Improved Power Analysis Attacks on Falcon
Abstract
Falcon is one of the three post-quantum signature schemes selected for standardization by NIST. Due to its low bandwidth and high efficiency, Falcon is seen as an attractive option for quantum-safe embedded systems. In this work, we study Falcon's side-channel resistance by analysing its Gaussian samplers. Our results are mainly twofold.
The first result is an improved key recovery exploiting the leakage within the base sampler investigated by Guerreau et al. (CHES 2022). Instead of resorting to the fourth moment as in former parallelepiped-learning attacks, we work with the second order statistics covariance and use its spectral decomposition to recover the secret information. Our approach substantially reduces the requirement for measurements and computation resources:
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Published by the IACR in EUROCRYPT 2023
- Contact author(s)
-
zsd19 @ mails tsinghua edu cn
xhlin @ mail sdu edu cn
yu-yang @ mail tsinghua edu cn
wjwang @ sdu edu cn - History
- 2023-02-20: approved
- 2023-02-19: received
- See all versions
- Short URL
- https://ia.cr/2023/224
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/224, author = {Shiduo Zhang and Xiuhan Lin and Yang Yu and Weijia Wang}, title = {Improved Power Analysis Attacks on Falcon}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/224}, year = {2023}, url = {https://eprint.iacr.org/2023/224} }