Paper 2025/904

The Security of ML-DSA against Fault-Injection Attacks

Haruhisa Kosuge, NTT (Japan)
Keita Xagawa, Technology Innovation Institute
Abstract

Deterministic signatures are often used to mitigate the risks associated with poor-quality randomness, where the randomness in the signing process is generated by a pseudorandom function that takes a message as input. However, some studies have shown that such signatures are vulnerable to fault-injection attacks. To strike a balance, recent signature schemes often adopt "hedged" randomness generation, where the pseudorandom function takes both a message and a nonce as input. Aranha et al. (EUROCRYPT 2020) investigated the security of hedged Fiat-Shamir signatures against 1-bit faults and demonstrated security for certain types of bit-tampering faults. Grilo et al. (ASIACRYPT 2021) extended this proof to the quantum random oracle model. Last year, NIST standardized the lattice-based signature scheme ML-DSA, which adopts the hedged Fiat-Shamir with aborts. However, existing security proofs against bit-tampering faults do not directly apply, as Aranha et al. left this as an open problem. To address this gap, we analyze the security of ML-DSA against multi-bit fault-injection attacks. We provide a formal proof of security for a specific class of intermediate values, showing that faults at these points cannot be exploited. Furthermore, to highlight the infeasibility of stronger fault resilience, we present key-recovery attacks that exploit signatures generated under fault injection at the other intermediate values.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Digital signaturePost-quantum cryptographyML-DSAFault-injection attackProvable securityQuantum random oracle model
Contact author(s)
hrhs kosuge @ ntt com
keita xagawa @ tii ae
History
2025-05-21: approved
2025-05-20: received
See all versions
Short URL
https://ia.cr/2025/904
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/904,
      author = {Haruhisa Kosuge and Keita Xagawa},
      title = {The Security of {ML}-{DSA} against Fault-Injection Attacks},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/904},
      year = {2025},
      url = {https://eprint.iacr.org/2025/904}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.