Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem

Uloženo v:
Podrobná bibliografie
Název: Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem
Autoři: Colombier, Brice, Dragoi, Vlad, Cayrel, Pierre-Louis, Grosso, Vincent
Přispěvatelé: Architectures and Methods for Resilient Systems (TIMA-AMfoRS ), Techniques de l'Informatique et de la Microélectronique pour l'Architecture des systèmes intégrés (TIMA), Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP ), Université Grenoble Alpes (UGA)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP ), Université Grenoble Alpes (UGA), Aurel Vlaicu University of Arad (UAV), Laboratoire Hubert Curien (LHC), Institut d'Optique Graduate School (IOGS)-Université Jean Monnet - Saint-Étienne (UJM)-Centre National de la Recherche Scientifique (CNRS)
Zdroj: ISSN: 1556-6013 ; IEEE Transactions on Information Forensics and Security ; https://hal.inria.fr/hal-03726286 ; IEEE Transactions on Information Forensics and Security, In press.
Informace o vydavateli: HAL CCSD
Institute of Electrical and Electronics Engineers
Rok vydání: 2022
Sbírka: Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
Témata: Post-quantum Cryptography, Syndrome Decoding Problem, Side-channel Attack, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Popis: International audience ; The NIST standardization process for post-quantum cryptography has been drawing the attention of researchers to the submitted candidates. One direction of research consists in implementing those candidates on embedded systems and that exposes them to physical attacks in return. The Classic McEliece cryptosystem, which is among the four finalists of round 3 in the Key Encapsulation Mechanism category, builds its security on the hardness of the syndrome decoding problem, which is a classic hard problem in code-based cryptography. This cryptosystem was recently targeted by a laser fault injection attack leading to message recovery. Regrettably, the attack setting is very restrictive and it does not tolerate any error in the faulty syndrome. Moreover, it depends on the very strong attacker model of laser fault injection, and does not apply to optimised implementations of the algorithm that make optimal usage of the machine words capacity. In this article, we propose a to change the angle and perform a message-recovery attack that relies on side-channel information only. We improve on the previously published work in several key aspects. First, we show that sidechannel information, obtained with power consumption analysis, is sufficient to obtain an integer syndrome, as required by the attack framework. This is done by leveraging classic machine learning techniques that recover the Hamming weight information very accurately. Second, we put forward a computationallyefficient method, based on a simple dot product and informationset decoding algorithms, to recover the message from the, possibly inaccurate, recovered integer syndrome. Finally, we present a masking countermeasure against the proposed attack.
Druh dokumentu: article in journal/newspaper
Jazyk: English
Relation: hal-03726286; https://hal.inria.fr/hal-03726286; https://hal.inria.fr/hal-03726286/document; https://hal.inria.fr/hal-03726286/file/TIFS.pdf
Dostupnost: https://hal.inria.fr/hal-03726286
https://hal.inria.fr/hal-03726286/document
https://hal.inria.fr/hal-03726286/file/TIFS.pdf
Rights: info:eu-repo/semantics/OpenAccess
Přístupové číslo: edsbas.E45BC304
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://hal.inria.fr/hal-03726286#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Colombier%20B
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.E45BC304
RelevancyScore: 925
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 925.000732421875
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Colombier%2C+Brice%22">Colombier, Brice</searchLink><br /><searchLink fieldCode="AR" term="%22Dragoi%2C+Vlad%22">Dragoi, Vlad</searchLink><br /><searchLink fieldCode="AR" term="%22Cayrel%2C+Pierre-Louis%22">Cayrel, Pierre-Louis</searchLink><br /><searchLink fieldCode="AR" term="%22Grosso%2C+Vincent%22">Grosso, Vincent</searchLink>
– Name: Author
  Label: Contributors
  Group: Au
  Data: Architectures and Methods for Resilient Systems (TIMA-AMfoRS )<br />Techniques de l'Informatique et de la Microélectronique pour l'Architecture des systèmes intégrés (TIMA)<br />Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )<br />Université Grenoble Alpes (UGA)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )<br />Université Grenoble Alpes (UGA)<br />Aurel Vlaicu University of Arad (UAV)<br />Laboratoire Hubert Curien (LHC)<br />Institut d'Optique Graduate School (IOGS)-Université Jean Monnet - Saint-Étienne (UJM)-Centre National de la Recherche Scientifique (CNRS)
– Name: TitleSource
  Label: Source
  Group: Src
  Data: <i>ISSN: 1556-6013 ; IEEE Transactions on Information Forensics and Security ; https://hal.inria.fr/hal-03726286 ; IEEE Transactions on Information Forensics and Security, In press</i>.
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: HAL CCSD<br />Institute of Electrical and Electronics Engineers
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2022
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Post-quantum+Cryptography%22">Post-quantum Cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22Syndrome+Decoding+Problem%22">Syndrome Decoding Problem</searchLink><br /><searchLink fieldCode="DE" term="%22Side-channel+Attack%22">Side-channel Attack</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-CR]Computer+Science+[cs]%2FCryptography+and+Security+[cs%2ECR]%22">[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: International audience ; The NIST standardization process for post-quantum cryptography has been drawing the attention of researchers to the submitted candidates. One direction of research consists in implementing those candidates on embedded systems and that exposes them to physical attacks in return. The Classic McEliece cryptosystem, which is among the four finalists of round 3 in the Key Encapsulation Mechanism category, builds its security on the hardness of the syndrome decoding problem, which is a classic hard problem in code-based cryptography. This cryptosystem was recently targeted by a laser fault injection attack leading to message recovery. Regrettably, the attack setting is very restrictive and it does not tolerate any error in the faulty syndrome. Moreover, it depends on the very strong attacker model of laser fault injection, and does not apply to optimised implementations of the algorithm that make optimal usage of the machine words capacity. In this article, we propose a to change the angle and perform a message-recovery attack that relies on side-channel information only. We improve on the previously published work in several key aspects. First, we show that sidechannel information, obtained with power consumption analysis, is sufficient to obtain an integer syndrome, as required by the attack framework. This is done by leveraging classic machine learning techniques that recover the Hamming weight information very accurately. Second, we put forward a computationallyefficient method, based on a simple dot product and informationset decoding algorithms, to recover the message from the, possibly inaccurate, recovered integer syndrome. Finally, we present a masking countermeasure against the proposed attack.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: hal-03726286; https://hal.inria.fr/hal-03726286; https://hal.inria.fr/hal-03726286/document; https://hal.inria.fr/hal-03726286/file/TIFS.pdf
– Name: URL
  Label: Availability
  Group: URL
  Data: https://hal.inria.fr/hal-03726286<br />https://hal.inria.fr/hal-03726286/document<br />https://hal.inria.fr/hal-03726286/file/TIFS.pdf
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: info:eu-repo/semantics/OpenAccess
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.E45BC304
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.E45BC304
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Post-quantum Cryptography
        Type: general
      – SubjectFull: Syndrome Decoding Problem
        Type: general
      – SubjectFull: Side-channel Attack
        Type: general
      – SubjectFull: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
        Type: general
    Titles:
      – TitleFull: Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Colombier, Brice
      – PersonEntity:
          Name:
            NameFull: Dragoi, Vlad
      – PersonEntity:
          Name:
            NameFull: Cayrel, Pierre-Louis
      – PersonEntity:
          Name:
            NameFull: Grosso, Vincent
      – PersonEntity:
          Name:
            NameFull: Architectures and Methods for Resilient Systems (TIMA-AMfoRS )
      – PersonEntity:
          Name:
            NameFull: Techniques de l'Informatique et de la Microélectronique pour l'Architecture des systèmes intégrés (TIMA)
      – PersonEntity:
          Name:
            NameFull: Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )
      – PersonEntity:
          Name:
            NameFull: Université Grenoble Alpes (UGA)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )
      – PersonEntity:
          Name:
            NameFull: Université Grenoble Alpes (UGA)
      – PersonEntity:
          Name:
            NameFull: Aurel Vlaicu University of Arad (UAV)
      – PersonEntity:
          Name:
            NameFull: Laboratoire Hubert Curien (LHC)
      – PersonEntity:
          Name:
            NameFull: Institut d'Optique Graduate School (IOGS)-Université Jean Monnet - Saint-Étienne (UJM)-Centre National de la Recherche Scientifique (CNRS)
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2022
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: ISSN: 1556-6013 ; IEEE Transactions on Information Forensics and Security ; https://hal.inria.fr/hal-03726286 ; IEEE Transactions on Information Forensics and Security, In press
              Type: main
ResultId 1