Chosen-Ciphertext Clustering Attack on CRYSTALS-KYBER Using the Side-Channel Leakage of Barrett Reduction
نویسندگان
چکیده
This study proposes a chosen-ciphertext side-channel attack against lattice-based key encapsulation mechanism (KEM), the third-round candidate of national institute standards and technology (NIST) standardization project. Unlike existing attacks that target operations, such as inverse NTT message encoding/decoding, we $\mathsf {Barrett~reduction}$ in decapsulation phase {CRYSTALS{-}KYBER}$ to obtain secret key. We show sensitive variable-dependent leakage exposes an entire The results experiments conducted on ARM Cortex-M4 microcontroller accomplish success rate 100%. only need six chosen ciphertexts for {KYBER512}$ {KYBER768}$ eight {KYBER1024}$ . also {m4}$ scheme {pqm4}$ library, implementation with specific optimization (typically assembly), is vulnerable proposed attack. In this scheme, six, nine, twelve are required , respectively.
منابع مشابه
Chosen Ciphertext Attack on SSS
The stream cipher Self-Synchronizing Sober (SSS) is a candidate in the ECRYPT stream cipher competition. In this paper, we describe a chosen ciphertext attack on SSS. Our implementation of the attack recovers the entire secret state of SSS in around 10 seconds on a 2.8GHz PC, and requires a single chosen ciphertext of less than 10 kByte. The designers of SSS state that chosen ciphertext attacks...
متن کاملChosen-ciphertext attack on noncommutative Polly Cracker
1 Noncommutative Polly Cracker and preliminaries from noncommutative algebra The noncommutative Polly Cracker cryptosystems were developed by T.Rai in his Ph.D. dissertation ([1]), and rely on the fact that there are ideals of noncom-mutative algebras over finite fields that have infinite reduced Groebner bases. First let us briefly present notations that will be used further in the text. Every...
متن کاملA Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of the polynomial mixing system with the independence of reduction modulo two relatively prime integers p and q. In this paper, we examine the effect of feeding special polynomials built from the public key to the decryp...
متن کاملAdversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack
We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) [1] and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for “A Secure TFTP Protocol with Security Proofs” [1]. Keywords—Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-C...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2022
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2022.3179683