2022
DOI: 10.46586/tches.v2022.i4.372-396
|View full text |Cite
|
Sign up to set email alerts
|

Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks

Abstract: Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention. In particular, it has been shown that some post-quantum Key Encapsulation Mechanisms (KEMs) are vulnerable to Chosen-Ciphertext Side-Channel Attacks (CC-SCA). These powerful attacks target the re-encryption step in the Fujisaki-Okamoto (FO) transform, which is commonly used to achieve CCA security in such schemes. To sufficiently protect PQC KEMs … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…A negacyclic rotation of the message may be achieved by multiplying both u and v by an indeterminate X, provided that c is created correctly. Decode (-y) and decode (y) can evaluate different values, which is why this approach may result in mistakes for specific ciphertexts used in secret key recovery attempts [51,52].…”
Section: Attacks Against Crystals-kybermentioning
confidence: 99%
“…A negacyclic rotation of the message may be achieved by multiplying both u and v by an indeterminate X, provided that c is created correctly. Decode (-y) and decode (y) can evaluate different values, which is why this approach may result in mistakes for specific ciphertexts used in secret key recovery attempts [51,52].…”
Section: Attacks Against Crystals-kybermentioning
confidence: 99%
“…In [18], the authors proposed the use of a conceptually simple construction, the Encryptthen-Sign (E tS) KEM that reduces the impact of CC-SCA. This construction uses the paradigm introduced by Zheng et al [19] and analyzed by An et al [20], and it instantiates a post-quantum authenticated KEM in the outsider-security model.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…Additionally, one crucial aspect is to guarantee that no sensitive information is leaked in the implementation of a post-quantum algorithm. Additionally, several post-quantum constructions are particularly vulnerable to Side-Channel Attacks (SCAs) that exploit specifically chosen ciphertexts to amplify the observed leakage, known as Chosen-Ciphertext Side-Channel Analysis (CC-SCA), [2]. The security evaluation of post-quantum schemes against attacks and the development of effective countermeasures to mitigate them are open research topics [3].…”
Section: Introductionmentioning
confidence: 99%