Abstract
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation has been widely used in actively securing KEMs from passively secure public key encryption (PKE), as it is employed in most of NIST post-quantum cryptography (PQC) candidates for KEM. The proposed attack exploits side-channel leakage during execution of a pseudorandom function (PRF) or pseudorandom number generator (PRG) in the re-encryption of KEM decapsulation as a plaintext-checking oracle that tells whether the PKE decryption result is equivalent to the reference plaintext. The generality and practicality of the plaintext-checking oracle allow the proposed attack to attain a full-key recovery of various KEMs when an active attack on the underlying PKE is known. This paper demonstrates that the proposed attack can be applied to most NIST PQC third-round KEM candidates, namely, Kyber, Saber, FrodoKEM, NTRU, NTRU Prime, HQC, BIKE, and SIKE (for BIKE, the proposed attack achieves a partial key recovery). The applicability to Classic McEliece is unclear because there is no known active attack on this cryptosystem. This paper also presents a side-channel distinguisher design based on deep learning (DL) for mounting the proposed attack on practical implementation without the use of a profiling device. The feasibility of the proposed attack is evaluated through experimental attacks on various PRF implementations (a SHAKE software, an AES software, an AES hardware, a bit-sliced masked AES software, and a masked AES hardware based on threshold implementation). Although it is difficult to implement the oracle using the leakage from the TI-based masked hardware, the success of the proposed attack against these implementations (even except for the masked hardware), which include masked software, confirms its practicality.
Highlights
1.1 BackgroundPublic key encryption (PKE) is a cryptographic primitive essential for secure information systems
We investigate the applicability of the proposed attack to NIST post-quantum cryptography (PQC) third-round key encapsulation mechanism (KEM) candidates, and demonstrate that Kyber, Saber, FrodoKEM, NTRU, NTRU Prime, HQC, BIKE, and SIKE are vulnerable to the proposed side-channel analysis (SCA)
Some variants avoid the complete re-encryption for computational efficiency (e.g., [DOV21] and NTRU submitted to NIST PQC), the proposed SCA would be applicable to these CPA-to-CCA-secure transformations as long as they involve pseudorandom function (PRF)/pseudorandom number generator (PRG) and/or procedure corresponding to equality/validity check
Summary
Public key encryption (PKE) is a cryptographic primitive essential for secure information systems. Some recent studies have shown that the FO transformation can leak the secret key, even if the underlying PKE is securely implemented [GTN20, RRCB20, PP21]. These attacks exploit side-channel leakage or fault injection to obtain information about the PKE decryption result, and mount a chosen-ciphertext attack on the underlying PKE. Such side-channel-assisted chosen-ciphertext attacks have been studied on public key primitives after the disclosure of Bleichenbacher’s padding oracle attack on RSA PKCS [Ble98]. A detailed evaluation of the applicability/limitations of SCAs on the FO transformation is essential for developing an adequate countermeasure for the sake of secure KEM implementation
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: IACR Transactions on Cryptographic Hardware and Embedded Systems
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.