2020
DOI: 10.46586/tches.v2020.i3.243-268
|View full text |Cite
|
Sign up to set email alerts
|

Single-Trace Attacks on Keccak

Abstract: Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications. It is, for instance, a common building block in schemes submitted to NIST’s post-quantum cryptography project. In many of these applications, Keccak processes ephemeral secrets. In such a setting, side-channel adversaries are limited to a single observation, meaning that differential attacks are inherently prevented. If, however, such a single trace of Keccak can already be suffi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…These attacks are able to defeat masking countermeasures as the leakage of both corresponding shares is already present in a single horizontal trace. Single-trace template attacks against masked NTT software implementations have been shown in [PPM17,PP19] and against Keccak in [KPP20]. The attacks of these works are based on Soft-Analytical Side-Channel Attacks (SASCA) [VCGS14], which take the output of a template attack and feed it into a graph representation to apply belief propagation.…”
Section: Horizontal Attacks On Masked Implementationsmentioning
confidence: 99%
“…These attacks are able to defeat masking countermeasures as the leakage of both corresponding shares is already present in a single horizontal trace. Single-trace template attacks against masked NTT software implementations have been shown in [PPM17,PP19] and against Keccak in [KPP20]. The attacks of these works are based on Soft-Analytical Side-Channel Attacks (SASCA) [VCGS14], which take the output of a template attack and feed it into a graph representation to apply belief propagation.…”
Section: Horizontal Attacks On Masked Implementationsmentioning
confidence: 99%
“…When adapting the factor graph to the situation where two NTT coefficients are stored within the same word, one could make use of a strategy that is already used in the single-trace attack on 32-bit implementations on Keccak in [KPP20]. There, the authors use a clustering approach to represent one 32-bit word as two halfwords in the factor graph, not because the algorithmic description of Keccak requires it, but because BP runs into serious runtime issues when performing message passing for 32-bit variable nodes.…”
Section: Application To Other Implementationsmentioning
confidence: 99%
“…As shown in Sections 5.4 and 6 this optimization gives significant performance gains, so we see this as a reasonable trade-off. Recent work by Kannwischer et al [KPP20] describes single-trace attacks on the unprotected XKCP Keccak implementation. These attacks use a single trace recorded during the computation of y = SHAKE(sk||x) and aim to recover all of a secret key sk, or part of y.…”
Section: Implementation Security Optionsmentioning
confidence: 99%
“…These attacks use a single trace recorded during the computation of y = SHAKE(sk||x) and aim to recover all of a secret key sk, or part of y. While single-trace attacks could threaten some of the unprotected hash calls in our optimized implementation (e.g., when deriving the per-party or per-MPC instance seeds), the results of [KPP20] do not extend to the M4, and the length constraints on sk, x, and y in our application. Future work may improve single-trace attacks, and in that case the conclusion of [KPP20] is that lightweight countermeasures will provide effective mitigation.…”
Section: Implementation Security Optionsmentioning
confidence: 99%