Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem

نویسندگان

چکیده

The NIST standardization process for post-quantum cryptography has been drawing the attention of researchers to submitted candidates. One direction research consists in implementing those candidates on embedded systems and that exposes them physical attacks return. Classic McEliece cryptosystem, which is among four finalists round 3 Key Encapsulation Mechanism category, builds its security hardness syndrome decoding problem, a classic hard problem code-based cryptography. This cryptosystem was recently targeted by laser fault injection attack leading message recovery. Regrettably, setting very restrictive it does not tolerate any error faulty syndrome. Moreover, depends strong attacker model injection, apply optimised implementations algorithm make optimal usage machine words capacity. In this article, we propose change angle perform message-recovery relies side-channel information only. We improve previously published work several key aspects. First, show information, obtained with power consumption analysis, sufficient obtain an integer syndrome, as required framework. done leveraging learning techniques recover Hamming weight accurately. Second, put forward computationally-efficient method, based simple dot product information-set algorithms, from the, possibly inaccurate, recovered Finally, present masking countermeasure against proposed attack.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Cryptosystems Based on HCDLP

We present an algorithm for solving the discrete logarithm problem on hyperelliptic curves defined over finite field when the cyclic group can be represented by special form. On the general case, we design a method to attack on hyperelliptic curve cryptosystems. As an example, we illustrate an attack on the Twin Diffie-Hellman key agreement scheme[5]. As a byproduct, we enumerate the isomorphis...

متن کامل

Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields

Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is crucial to provide efficient and secure implementations of the pairings. There have been several works on efficient implementations of the pairings. However, the research for secure implementations of the pairings ha...

متن کامل

Scan-Based Side-Channel Attack on the RSA Cryptosystem

Individual authentication increases in importance as network technology advances. IC passport, SIM card and ID card used in entering and leaving management systems are dependent on a cryptography circuit for keeping their security. LSI chips used there usually include cryptography circuits and encrypt/decrypt important data such as ID numbers and electronic money information. However, there is ...

متن کامل

Profiled Model Based Power Simulator for Side Channel Evaluation

An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks. This forces smart-card manufacturers to carefully consider development of security mechanisms. To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time. Based on a high level simulator, we propose to use profi...

متن کامل

On Side Channel Cryptanalysis and Sequential Decoding

This paper presents an approach for side channel cryptanalysis with iterative approximate Bayesian inference, based on sequential decoding methods. Reliability information about subkey hypotheses is generated in the form of likelihoods, and sets of subkey hypothesis likelihoods are optimally combined into key bit log likelihood ratios. The redundancy of expanded keys in multi-round cryptographi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2022

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2022.3198277