We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.
International Association for Cryptologic Research (IACR)
Abstract
We report an important implementation vulnerability exploitable through physical attacks for message recovery
in five lattice-based public-key encryption schemes (PKE) and Key Encapsulation Mechanisms (KEM) -
NewHope, Kyber, Saber, Round5 and LAC that are currently competing in the second round of NIST\u27s standardization process for post-quantum cryptography. The reported vulnerability exists in the message decoding function which
is a fundamental kernel present in lattice-based PKE/KEMs and further analysis of the implementations
in the public pqm4 library revealed that the message decoding function is implemented in a similar manner
in all the identified schemes and thus they all share the common side-channel vulnerability that leaks
individual bits of the secret message. We demonstrate that the identified vulnerability can be
exploited through a number of practical electromagnetic side-channel attacks, fault attacks and
combined attacks on implementations from the pqm4 library running on the ARM Cortex-M4
microcontroller. As a key contribution, we also demonstrate the first practical EM-based combined
side-channel and fault attack on lattice-based PKE/KEMs
Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.