Paper 2019/795

More Practical Single-Trace Attacks on the Number Theoretic Transform

Peter Pessl and Robert Primas

Abstract

Single-trace side-channel attacks are a considerable threat to implementations of classic public-key schemes. For lattice-based cryptography, however, this class of attacks is much less understood, and only a small number of previous works show attacks. Primas et al., for instance, present a single-trace attack on the Number Theoretic Transform (NTT), which is at the heart of many efficient lattice-based schemes. They, however, attack a variable-time implementation and also require a rather powerful side-channel adversary capable of creating close to a million multivariate templates. Thus, it was an open question if such an attack can be made practical while also targeting state-of-the-art constant-time implementations. In this paper, we answer this question positively. First, we introduce several improvements to the usage of belief propagation, which underlies the attack. And second, we change the target to encryption instead of decryption; this limits attacks to the recovery of the transmitted symmetric key, but in turn, increases attack performance. All this then allows successful attacks even when switching to univariate Hamming-weight templates. We evaluate the performance and noise resistance of our attack using simulations, but also target a real device. Concretely, we successfully attack an assembly-optimized constant-time Kyber implementation running on an ARM Cortex M4 microcontroller while requiring the construction of only 213 templates.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Latincrypt 2019
Keywords
side-channel attackspost-quantum cryptographylattice-based cryptographybelief propagation
Contact author(s)
peter pessl @ iaik tugraz at
History
2019-07-14: received
Short URL
https://ia.cr/2019/795
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/795,
      author = {Peter Pessl and Robert Primas},
      title = {More Practical Single-Trace Attacks on the Number Theoretic Transform},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/795},
      year = {2019},
      url = {https://eprint.iacr.org/2019/795}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.