Paper 2025/009

Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust

Merve Karabulut, Florida Atlantic University
Reza Azarderakhsh, Florida Atlantic University
Abstract

Side-channel attacks (SCA) pose a significant threat to cryptographic implementations, including those designed to withstand the computational power of quantum computers. This paper introduces the first side-channel attack on an industry-grade post-quantum cryptography implementation. Specifically, we present a Correlation Power Analysis (CPA) attack targeting the open-source hardware implementation of ML-DSA within a Silicon Root of Trust framework developed through a multi-party collaboration involving leading technology companies. Our attack focuses on the modular reduction process that follows the Number Theoretic Transform-based polynomial pointwise multiplication. By exploiting side-channel leakage from a distinctive unique reduction algorithm and leveraging the zeroization mechanism used to securely erase sensitive information by clearing internal registers, we significantly enhance the attack's efficacy. Our findings reveal that an adversary can extract the secret keys using only 10,000 power traces. With access to these keys, an attacker could forge signatures for certificate generation, thereby compromising the integrity of the root of trust. This work highlights the vulnerabilities of industry-standard root-of-trust systems to side-channel attacks. It underscores the urgent need for robust countermeasures to secure commercially deployed systems against such threats.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side-channel AttacksML-DSAQuantum-Resistant CryptographyCorrelation Power AnalysisZeroizationRoot-of-Trust.
Contact author(s)
mkarabulut2024 @ fau edu
razarderakhsh @ fau edu
History
2025-01-07: last of 3 revisions
2025-01-02: received
See all versions
Short URL
https://ia.cr/2025/009
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/009,
      author = {Merve Karabulut and Reza Azarderakhsh},
      title = {Efficient {CPA} Attack on Hardware Implementation of {ML}-{DSA} in Post-Quantum Root of Trust},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/009},
      year = {2025},
      url = {https://eprint.iacr.org/2025/009}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.