Paper 2025/378

Side-Channel and Fault Injection Attacks on VOLEitH Signature Schemes: A Case Study of Masked FAEST

Sönke Jendral, Royal Institute of Technology
Elena Dubrova, Royal Institute of Technology
Abstract

Ongoing efforts to transition to post-quantum public-key cryptosystems have created the need for algorithms with a variety of performance characteristics and security assumptions. Among the candidates in NIST's post-quantum standardisation process for additional digital signatures is FAEST, a Vector Oblivious Linear Evaluation in-the-Head (VOLEitH)-based scheme, whose security relies on the one-wayness of the Advanced Encryption Standard (AES). The VOLEitH paradigm enables competitive performance and signature sizes under conservative security assumptions. However, since it was introduced recently, in 2023, its resistance to physical attacks has not yet been analysed. In this paper, we present the first security analysis of VOLEitH-based signature schemes in the context of side-channel and fault injection attacks. We demonstrate four practical attacks on a masked implementation of FAEST in ARM Cortex-M4 capable of recovering the full secret key with high probability (greater than 0.87) from a single signature. These attacks exploit vulnerabilities of components specific to VOLEitH schemes and FAEST, such as the parallel all-but-one vector commitments, the VOLE generation, and the AES proof generation. Finally, we propose countermeasures to mitigate these attacks and enhance the physical security of VOLEitH-based signature schemes.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side-channel analysisFault injectionFAESTVOLEitHPost-quantum digital signatureKey recovery attack
Contact author(s)
jendral @ kth se
dubrova @ kth se
History
2025-04-08: revised
2025-02-27: received
See all versions
Short URL
https://ia.cr/2025/378
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/378,
      author = {Sönke Jendral and Elena Dubrova},
      title = {Side-Channel and Fault Injection Attacks on {VOLEitH} Signature Schemes: A Case Study of Masked {FAEST}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/378},
      year = {2025},
      url = {https://eprint.iacr.org/2025/378}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.