Breaking a fifth-order masked implementation of crystals-kyber by copy-paste

E Dubrova, K Ngo, J Gärtner, R Wang - … of the 10th ACM Asia Public-Key …, 2023 - dl.acm.org
CRYSTALS-Kyber has been selected by the NIST as a public-key encryption and key
encapsulation mechanism to be standardized. It is also included in the NSA's suite of …

Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs

R Ueno, K Xagawa, Y Tanaka, A Ito… - IACR Transactions on …, 2022 - tches.iacr.org
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM)
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …

Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results

P Ravi, A Chattopadhyay, JP D'Anvers… - ACM Transactions on …, 2024 - dl.acm.org
In this work, we present a systematic study of Side-Channel Attacks (SCA) and Fault
Injection Attacks (FIA) on structured lattice-based schemes, with main focus on Kyber Key …

Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates

K Xagawa, A Ito, R Ueno, J Takahashi… - Advances in Cryptology …, 2021 - Springer
We investigate all NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection
attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and …

Profiling side-channel attacks on Dilithium: A small bit-fiddling leak breaks it all

S Marzougui, V Ulitzsch, M Tibouchi… - Cryptology ePrint …, 2022 - eprint.iacr.org
We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based
signature scheme, one of the top contenders in the NIST postquantum cryptography …

Secret key recovery attack on masked and shuffled implementations of CRYSTALS-Kyber and Saber

L Backlund, K Ngo, J Gärtner, E Dubrova - International Conference on …, 2023 - Springer
Shuffling is a well-known countermeasure against side-channel attacks. It typically uses the
Fisher-Yates (FY) algorithm to generate a random permutation which is then utilized as the …

On exploiting message leakage in (few) NIST PQC candidates for practical message recovery attacks

P Ravi, S Bhasin, SS Roy… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, we propose generic and practical side-channel attacks for message recovery in
post-quantum lattice-based public key encryption (PKE) and key encapsulation mechanisms …

Breaking masked and shuffled CCA secure Saber KEM by power analysis

K Ngo, E Dubrova, T Johansson - Proceedings of the 5th Workshop on …, 2021 - dl.acm.org
In this paper, we show that a software implementation of CCA secure Saber KEM protected
by first-order masking and shuffling can be broken by deep learning-based power analysis …

Single-trace side-channel attacks on ω-small polynomial sampling: with applications to NTRU, NTRU prime, and crystals-dilithium

E Karabulut, E Alkim, A Aysu - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum
protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and …

[PDF][PDF] PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms.

J Park, NN Anandakumar, D Saha… - IACR Cryptol. ePrint …, 2022 - researchgate.net
Research in post-quantum cryptography (PQC) aims to develop cryptographic algorithms
that can withstand classical and quantum attacks. The recent advance in the PQC field has …