Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography
Bo-Yeon Sim,Jihoon Kwon,Kyu Young Choi,Jihoon Cho,Aesun Park,Dong-Guk Han +5 more
- Vol. 2019, pp 180-212
TLDR
A multiple-trace attack which enables to completely recover accurate secret indices and a singletrace attack which can even work when using ephemeral keys or applying Rossi et al.Abstract:
Chou suggested a constant-time implementation for quasi-cyclic moderatedensity parity-check (QC-MDPC) code-based cryptography to mitigate timing attacks at CHES 2016. This countermeasure was later found to become vulnerable to a differential power analysis (DPA) in private syndrome computation, as described by Rossi et al. at CHES 2017. The proposed DPA, however, still could not completely recover accurate secret indices, requiring further solving linear equations to obtain entire secret information. In this paper, we propose a multiple-trace attack which enables to completely recover accurate secret indices. We further propose a singletrace attack which can even work when using ephemeral keys or applying Rossi et al.’s DPA countermeasures. Our experiments show that the BIKE and LEDAcrypt may become vulnerable to our proposed attacks. The experiments are conducted using power consumption traces measured from ChipWhisperer-Lite XMEGA (8-bit processor) and ChipWhisperer UFO STM32F3 (32-bit processor) target boards.read more
Citations
More filters
Posted Content
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
TL;DR: The possibility of performing side-channel analysis in the quantum world is discussed and compared to attacks launched in the classic world, and proposals for quantum random number generation and quantum physically unclonable functions are compared to their classic counterparts and further analyzed to give a better understanding of their features, advantages, and shortcomings.
Book ChapterDOI
SoK: How (not) to Design and Implement Post-Quantum Cryptography
TL;DR: In this article, the current state of knowledge on post-quantum cryptography is analyzed from a transversal point of view, and the focus is on three areas: (i) paradigms, (ii) implementation, and (iii) deployment.
Journal ArticleDOI
Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions
TL;DR: In this article, the authors focus on the importance of physical security, with a focus on secure key generation and storage as well as secure execution, and propose quantum random number generation and quantum physically unclonable functions.
Journal ArticleDOI
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures
TL;DR: In this article, a side-channel attack on the key reconciliation in the quantum key distribution system is proposed, where the sifted key and the syndrome are used to derive a shared secret key between two users.
Journal ArticleDOI
Area–Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA
TL;DR: This article presents efficient and constant time implementation of BIKEI and BIKE-III in field-programmable gate array (FPGA), which has the best area–time efficiency so far.
References
More filters
Proceedings ArticleDOI
Algorithms for quantum computation: discrete logarithms and factoring
TL;DR: Las Vegas algorithms for finding discrete logarithms and factoring integers on a quantum computer that take a number of steps which is polynomial in the input size, e.g., the number of digits of the integer to be factored are given.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI
Use of Elliptic Curves in Cryptography
TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Book
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
TL;DR: In this paper, the authors present a comprehensive treatment of power analysis attacks and countermeasures, based on the principle that the only way to defend against such attacks is to understand them.