Paper 2025/214

Rejected Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks

Yuanyuan Zhou, SGS Brightsight BV, Delft, The Netherlands
Weijia Wang, Shandong University, School of Cyber Science and Technology, Qingdao, China, Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China
Yiteng Sun, Shandong University, School of Cyber Science and Technology, Qingdao, China, Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China
Yu Yu, Shanghai Jiao Tong University, Shanghai 200240, China, Shanghai Qi Zhi Institute, 701 Yunjin Road, Shanghai 200232, China
Abstract

Rejection sampling is a crucial security mechanism in lattice-based signature schemes that follow the Fiat-Shamir with aborts paradigm, such as ML-DSA/CRYSTALS-Dilithium. This technique transforms secret-dependent signature samples into ones that are statistically close to a secret-independent distribution (in the random oracle model). While many side-channel attacks have directly targeted sensitive data such as nonces, secret keys, and decomposed commitments, fewer studies have explored the potential leakage associated with rejection sampling. Notably, Karabulut~et~al. showed that leakage from rejected challenges can undermine, but not entirely break, the security of the Dilithium scheme. Motivated by the above, we convert the problem of key recovery (from the leakage of rejection sampling) to an integer linear programming problem (ILP), where rejected responses of unique Hamming weights set upper/lower constraints of the product between the challenge and the private key. We formally study the worst-case complexity of the problem as well as empirically confirm the practicality of the rejected challenge attack. For all three security levels of Dilithium-2/3/5, our attack recovers the private key in seconds or minutes with a 100% Success Rate (SR). Our attack leverages knowledge of the rejected challenge and response, and thus we propose methods to extract this information by exploiting side-channel leakage from Number Theoretic Transform (NTT) operations. We demonstrate the practicality of this rejected challenge attack by using real side-channel leakage on a Dilithium-2 implementation running on an ARM Cortex-M4 microcontroller. To the best of our knowledge, it is the first efficient side-channel key recovery attack on ML-DSA/Dilithium that targets the rejection sampling procedure. Furthermore, we discuss some countermeasures to mitigate this security issue.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
DilithiumML-DSASide-channel attacksRejection samplingInteger Linear Programming
Contact author(s)
zhou yuanyuan @ gmail com
wjwang @ sdu edu cn
sunyiteng @ mail sdu edu cn
yuyu @ yuyu hk
History
2025-02-16: revised
2025-02-12: received
See all versions
Short URL
https://ia.cr/2025/214
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/214,
      author = {Yuanyuan Zhou and Weijia Wang and Yiteng Sun and Yu Yu},
      title = {Rejected Challenges Pose New Challenges: Key Recovery of {CRYSTALS}-Dilithium via Side-Channel Attacks},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/214},
      year = {2025},
      url = {https://eprint.iacr.org/2025/214}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.