Paper 2024/1550

MAYO Key Recovery by Fixing Vinegar Seeds

Sönke Jendral, Royal Institute of Technology
Elena Dubrova, Royal Institute of Technology
Abstract

As the industry prepares for the transition to post-quantum secure public key cryptographic algorithms, vulnerability analysis of their implementations is gaining importance. A theoretically secure cryptographic algorithm should also be able to withstand the challenges of physical attacks in real-world environments. MAYO is a candidate in the ongoing first round of the NIST post-quantum standardization process for selecting additional digital signature schemes. This paper demonstrates three first-order single-execution fault injection attacks on a MAYO implementation in an ARM Cortex-M4 processor. By using voltage glitching to disrupt the computation of the vinegar seed during the signature generation, we enable the recovery of the secret key directly from the faulty signatures. Our experimental results show that the success rates of the fault attacks in a single execution are 36%, 82%, and 99%, respectively. They emphasize the importance of developing countermeasures against fault attacks prior to the widespread deployment of post-quantum algorithms like MAYO.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Fault injectionMAYOMultivariate cryptographyPost-quantum digital signatureKey recovery attack
Contact author(s)
jendral @ kth se
dubrova @ kth se
History
2024-10-04: approved
2024-10-03: received
See all versions
Short URL
https://ia.cr/2024/1550
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1550,
      author = {Sönke Jendral and Elena Dubrova},
      title = {{MAYO} Key Recovery by Fixing Vinegar Seeds},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1550},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1550}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.