Paper 2024/1550
MAYO Key Recovery by Fixing Vinegar Seeds
Abstract
As the industry prepares for the transition to post-quantum secure public key cryptographic algorithms, vulnerability analysis of their implementations is gaining importance. A theoretically secure cryptographic algorithm should also be able to withstand the challenges of physical attacks in real-world environments. MAYO is a candidate in the ongoing first round of the NIST post-quantum standardization process for selecting additional digital signature schemes. This paper demonstrates three first-order single-execution fault injection attacks on a MAYO implementation in an ARM Cortex-M4 processor. By using voltage glitching to disrupt the computation of the vinegar seed during the signature generation, we enable the recovery of the secret key directly from the faulty signatures. Our experimental results show that the success rates of the fault attacks in a single execution are 36%, 82%, and 99%, respectively. They emphasize the importance of developing countermeasures against fault attacks prior to the widespread deployment of post-quantum algorithms like MAYO.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Fault injectionMAYOMultivariate cryptographyPost-quantum digital signatureKey recovery attack
- Contact author(s)
-
jendral @ kth se
dubrova @ kth se - History
- 2024-10-04: approved
- 2024-10-03: received
- See all versions
- Short URL
- https://ia.cr/2024/1550
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1550, author = {Sönke Jendral and Elena Dubrova}, title = {{MAYO} Key Recovery by Fixing Vinegar Seeds}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1550}, year = {2024}, url = {https://eprint.iacr.org/2024/1550} }