2022
DOI: 10.46586/tches.v2022.i4.637-660
|View full text |Cite
|
Sign up to set email alerts
|

Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber

Abstract: At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack against Kyber in which a system of linear inequalities over the private key is generated and solved. The attack requires a laser and is, understandably, demonstrated with simulations—not actual equipment. We facilitate and diversify the attack in four ways, thereby admitting cheaper and more forgiving fault-injection setups. Firstly, the attack surface is enlarged: originally, the two input operands of the ciphertext comparison are co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
32
0
3

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(36 citation statements)
references
References 12 publications
1
32
0
3
Order By: Relevance
“…We develop a novel solver to obtain the secret key from linear inequalities obtained from leakage. This solver improves upon the Belief Propagation approach, which has been the de-facto approach in prior works [PP21,HPP21,Del22]. Our solver is easier to understand, more efficient to run and can recover the secret key with less than 2× number of linear inequalities compared to the state-of-the-art.…”
Section: Our Contributionmentioning
confidence: 99%
“…We develop a novel solver to obtain the secret key from linear inequalities obtained from leakage. This solver improves upon the Belief Propagation approach, which has been the de-facto approach in prior works [PP21,HPP21,Del22]. Our solver is easier to understand, more efficient to run and can recover the secret key with less than 2× number of linear inequalities compared to the state-of-the-art.…”
Section: Our Contributionmentioning
confidence: 99%
“…While this attack can be thwarted by shuffling the message decoding operation, Hermelink et al [HPP21] proposed an improved attack that can defeat the shuffling protection, but relies on a slightly stronger fault model of injecting targeted bit flip faults in memory. Delvaux [Del22] further improved the attack of Hermelink et al [HPP21] by expanding the attack surface to several operations within the decapsulation procedure, while also working with a variety of more relaxed fault models. However, their attack requires a tens to thousands of fault to recover the secret key, as they rely on weaker and relaxed fault models.…”
Section: Faulting the Decapsulation Proceduresmentioning
confidence: 99%
“…Проте введення точних одиночних помилок інверсії бітів у пам'яті потребує детальної інформації про цільовий пристрій, а також про реалізацію та розширене профілювання цільового пристрою. Нещодавно Del-vaux [25] покращив атаку [11]…”
Section: атаки відновлення ключа -обраний шифротекстunclassified
“…( ( ( )), ( ( ))) (1560, 60) ( ( ( )), ( ( ))) (957, 27) Хоча такий контрзахід здатний виявляти перекошені зашифровані тексти, обрані зашифровані тексти, що використовуються в Оракул_ЗР [6], а також ті, що використовуються в атаках помилками з обраним шифротекстом [11,24,25], є рівномірно випадковими. Це пояснюється тим, що подібні атаки передбачають додавання невеликих помилок до одного коефіцієнта дійсного зашифрованого тексту.…”
Section: захист від атак бічними каналами та помилками з обраним шифр...unclassified
See 1 more Smart Citation