2021
DOI: 10.46586/tches.v2021.i2.37-60
|View full text |Cite
|
Sign up to set email alerts
|

Fault Attacks on CCA-secure Lattice KEMs

Abstract: NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process and enable appropriately secure wider deployment after standardization. However, lattice-based key-encapsulation mechanisms (KEMs), which are prominently represented among the finalists, have thus far received little attention when it comes to fault attacks.Inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 26 publications
(40 citation statements)
references
References 13 publications
0
40
0
Order By: Relevance
“…A second, more acute problem with the solver from the IndoCrypt paper is that all inequalities are assumed to be correct, but fault-injection setups that supposedly provide these inequalities are not perfectly reliable. Based on a previous report by Pessl and Prokop [PP21a], a 1% error rate is yet to be exceeded. We alter the algorithm such that at least 25% of the inequalities can be incorrect.…”
Section: Contributionsmentioning
confidence: 99%
“…A second, more acute problem with the solver from the IndoCrypt paper is that all inequalities are assumed to be correct, but fault-injection setups that supposedly provide these inequalities are not perfectly reliable. Based on a previous report by Pessl and Prokop [PP21a], a 1% error rate is yet to be exceeded. We alter the algorithm such that at least 25% of the inequalities can be incorrect.…”
Section: Contributionsmentioning
confidence: 99%
“…Recently, [PP21] and [HPP21] presented fault attacks on several CCA-secure latticebased KEMs, including Kyber. Their attacks can be classified as safe-error attacks [YJ00] in that they inject a specific fault and then observe if decapsulation still returns the correct result.…”
Section: Attack Descriptionmentioning
confidence: 99%
“…[18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29] and fault attacks e.g. [30], [31], [32], [33], [34], [35], [36], [37], [5], [38] have been demonstrated by the research community on PQC schemes. These include cache attacks, power and EM side-channels, EM and laser injections, clock-glitches and the Rowhammer attack.…”
Section: Introductionmentioning
confidence: 99%