Paper 2025/830

Simple Power Analysis Attack on SQIsign

Anisha Mukherjee, Graz University of Technology
Maciej Czuprynko, Graz University of Technology
David Jacquemin, Graz University of Technology
Péter Kutas, Eötvös Loránd University, Hungary, University of Birmingham, England
Sujoy Sinha Roy, Graz University of Technology
Abstract

The isogeny-based post-quantum digital signature algorithm SQIsign offers the most compact key and signature sizes among all candidates in the ongoing NIST call for additional post-quantum signature algorithms. To the best of our knowledge, we present the first Simple Power Analysis (SPA) side-channel attack on SQIsign, demonstrating its feasibility for key recovery. Our attack specifically targets secret-dependent computations within Cornacchia's algorithm, a fundamental component of SQIsign's quaternion module. At the core of this algorithm, a secret-derived yet ephemeral exponent is used in a modular exponentiation subroutine. By performing SPA on the modular exponentiation, we successfully recover this ephemeral exponent. We then develop a method to show how this leaked exponent can be exploited to ultimately reconstruct the secret signing key of SQIsign. Our findings emphasize the critical need for side-channel-resistant implementations of SQIsign, highlighting previously unexplored vulnerabilities in its design.

Note: Accepted in Africacrypt 2025

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. Africacrypt 2025
Keywords
IsogenySQIsignSide-Channel AnalysisPQC
Contact author(s)
anisha mukherjee @ tugraz at
maciej czuprynko @ tugraz at
david jacquemin @ student tugraz at
kutasp @ gmail com
sujoy sinharoy @ tugraz at
History
2025-05-12: approved
2025-05-09: received
See all versions
Short URL
https://ia.cr/2025/830
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/830,
      author = {Anisha Mukherjee and Maciej Czuprynko and David Jacquemin and Péter Kutas and Sujoy Sinha Roy},
      title = {Simple Power Analysis Attack on {SQIsign}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/830},
      year = {2025},
      url = {https://eprint.iacr.org/2025/830}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.