Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
نویسندگان
چکیده
Well before large-scale quantum computers will be available, traditional cryptosystems must transitioned to post-quantum (PQ) secure schemes. The NIST PQC competition aims standardize suitable cryptographic Candidates are evaluated not only on their formal security strengths, but also judged based the with regard resistance against side-channel attacks. Although round 3 candidates have already been intensively vetted such attacks, one important attack vector has hitherto missed: PQ schemes often rely rejection sampling techniques obtain pseudorandomness from a specific distribution. In this paper, we reveal that routines seeded secretdependent information and leak timing result in practical key recovery attacks code-based encapsulation mechanisms HQC BIKE.Both BIKE selected as alternate third of competition, which puts them track for getting standardized separately o finalists. They specifically hardened constant-time decoders avoid However, show novel vulnerabilities both schemes: (1) Our secret requiresonly approx. 866,000 idealized decapsulation oracle queries 128-bit setting. It is structurally different previously identified scheme: Previously, exploitable leakages BCH decoder submitted version, ciphertext check well pseudorandom function Fujisaki-Okamoto transformation. contrast, our uses fact routine invoked during deterministic re-encryption leaks secret-dependent information, can efficiently exploited recover when instantiated (now constant-time) decoder, RMRS current submission. (2) From constant weight word sampler decapsulation, demonstrate how distinguish whether decoding step successful or not, distinguisher then used framework GJS derive distance spectrum key, using 5.8 x 107 queries. We provide details analyses fully implemented discussion possible countermeasures limits.
منابع مشابه
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem
EPOC-2 is a public-key cryptosystem that can be proved IND-CCA2 under the factoring assumption in the random oracle model. It was written into a standard specification P1363 of IEEE, and it has been a candidate of the public-key cryptosystem in several international standards (or portfolio) on cryptography, e.g. NESSIE, CRYPTREC, ISO, etc. In this paper we propose a chosen ciphertext attack aga...
متن کاملSpeed Optimizations in Bitcoin Key Recovery Attacks
In this paper we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitcoin and other cryptocurrencies. Our implementation improves the state of the art by a factor of 2.5, with focus on the cases where side channel attacks are not a concern and a large quantity of RAM is available. As a res...
متن کاملTiming Attacks due to Branch Predictions: A Presentation Tutorial
In this project, I aim to give a presentation based on Chapter 9 of the book TimingChannels in Cryptography [1]. In this presentation, I will cover the author’s understand-ing and viewpoint on Timing attacks based on Branch Predictions. This will mostly dealwith trying to crack RSA exponentiation, and will cover explaining various algorithmswhere branching plays a large role lik...
متن کاملKey recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
A novel internal state recovery attack on the whole Grain family of ciphers is proposed in this work. It basically uses the ideas of BSW sampling along with employing a weak placement of the tap positions of the driving LFSRs. The currently best known complexity trade-offs are obtained, and due to the structure of Grain family these attacks are also key recovery attacks. It is shown that the in...
متن کاملPassive-Only Key Recovery Attacks on RC4
We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by the WEP and WPA protocols to protect IEEE 802.11 wireless communications. First, we show how the previously discovered key recovery attacks can be improved by reducing the dependency between the secret key bytes. Then, we describe ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2022
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2022.i3.223-263