Masking Kyber: First- and Higher-Order Implementations

نویسندگان

چکیده

In the final phase of post-quantum cryptography standardization effort, focus has been extended to include side-channel resistance candidates. While some schemes have already extensively analyzed in this regard, there is no such study yet finalist Kyber.In work, we demonstrate first completely masked implementation Kyber which protected against first- and higher-order attacks. To best our knowledge, results any secure key encapsulation mechanism algorithm. This realized by introducing two new techniques. First, propose a algorithm for one-bit compression operation. based on bit-sliced binary-search that can be applied prime moduli. Second, technique enables one compare uncompressed polynomials with compressed public polynomials. avoids costly masking ciphertext while being able instantiated at arbitrary orders.We show performance first-, second- third-order implementations Arm Cortex-M0+ Cortex-M4F. Notably, first-order decapsulation requires 3.1 million cycles factor 3.5 overhead compared unprotected optimized implementationin pqm4. We experimentally modules hardened attacks using 100 000 traces mechanically verify security fine-grained leakage model verification tool scVerif.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Higher-Order Threshold Implementations

Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking. The existing higher-order masking countermeasures that guarantee security in the presence of glitches use multi-party computation techniques and require a lot of resources in terms of cir...

متن کامل

Higher-order Masking and Shu ing for Software Implementations of Block Ciphers

Di erential Power Analysis (DPA) is a powerful side channel key recovery attack that e ciently breaks block ciphers implementations. In software, two main techniques are usually applied to thwart them: masking and operations shu ing. To bene t from the advantages of the two techniques, recent works have proposed to combine them. However, the schemes which have been designed until now only provi...

متن کامل

Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers

Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually applied to thwart them: masking and operations shuffling. To benefit from the advantages of the two techniques, recent works have proposed to combine them. However, the schemes which have been designed until now only...

متن کامل

Uniform First-Order Threshold Implementations

Most masking schemes used as a countermeasure against side-channel analysis attacks require an extensive amount of fresh random bits on the fly. This is burdensome especially for lightweight cryptosystems. Threshold implementations (TIs) that are secure against firstorder attacks have the advantage that fresh randomness is not required if the sharing of the underlying function is uniform. Howev...

متن کامل

Provably Secure Higher-Order Masking of AES

Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data by the addition of one or several random value(s) (the masks). When dth-order masking is involved (i.e. when d masks are used per key-dependent variable), the complexity of performing an SCA grows exponentially with ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2021

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2021.i4.173-214