Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure
The Gaussian sampler is an integral part in lattice-based cryptography as it has a direct connection to security and efficiency. Although it is theoretically secure to use the Gaussian sampler, the security of its implementation is an open issue. Therefore, researchers have started to investigate th...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-10-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | http://www.mdpi.com/2076-3417/8/10/1809 |
id |
doaj-a91a211365c04de6a786dd9a208147ec |
---|---|
record_format |
Article |
spelling |
doaj-a91a211365c04de6a786dd9a208147ec2020-11-24T23:04:56ZengMDPI AGApplied Sciences2076-34172018-10-01810180910.3390/app8101809app8101809Single Trace Analysis on Constant Time CDT Sampler and Its CountermeasureSuhri Kim0Seokhie Hong1Center for Information Security Technologies (CIST), Korea University, Seoul 02841, KoreaCenter for Information Security Technologies (CIST), Korea University, Seoul 02841, KoreaThe Gaussian sampler is an integral part in lattice-based cryptography as it has a direct connection to security and efficiency. Although it is theoretically secure to use the Gaussian sampler, the security of its implementation is an open issue. Therefore, researchers have started to investigate the security of the Gaussian sampler against side-channel attacks. Since the performance of the Gaussian sampler directly affects the performance of the overall cryptosystem, countermeasures considering only timing attacks are applied in the literature. In this paper, we propose the first single trace power analysis attack on a constant-time cumulative distribution table (CDT) sampler used in lattice-based cryptosystems. From our analysis, we were able to recover every sampled value in the key generation stage, so that the secret key is recovered by the Gaussian elimination. By applying our attack to the candidates submitted to the National Institute of Standards and Technology (NIST), we were able to recover over 99% of the secret keys. Additionally, we propose a countermeasure based on a look-up table. To validate the efficiency of our countermeasure, we implemented it in Lizard and measure its performance. We demonstrated that the proposed countermeasure does not degrade the performance.http://www.mdpi.com/2076-3417/8/10/1809post-quantum cryptographylattice-based cryptographyGaussian samplingCDT samplingside-channel attacksingle trace analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Suhri Kim Seokhie Hong |
spellingShingle |
Suhri Kim Seokhie Hong Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure Applied Sciences post-quantum cryptography lattice-based cryptography Gaussian sampling CDT sampling side-channel attack single trace analysis |
author_facet |
Suhri Kim Seokhie Hong |
author_sort |
Suhri Kim |
title |
Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure |
title_short |
Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure |
title_full |
Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure |
title_fullStr |
Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure |
title_full_unstemmed |
Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure |
title_sort |
single trace analysis on constant time cdt sampler and its countermeasure |
publisher |
MDPI AG |
series |
Applied Sciences |
issn |
2076-3417 |
publishDate |
2018-10-01 |
description |
The Gaussian sampler is an integral part in lattice-based cryptography as it has a direct connection to security and efficiency. Although it is theoretically secure to use the Gaussian sampler, the security of its implementation is an open issue. Therefore, researchers have started to investigate the security of the Gaussian sampler against side-channel attacks. Since the performance of the Gaussian sampler directly affects the performance of the overall cryptosystem, countermeasures considering only timing attacks are applied in the literature. In this paper, we propose the first single trace power analysis attack on a constant-time cumulative distribution table (CDT) sampler used in lattice-based cryptosystems. From our analysis, we were able to recover every sampled value in the key generation stage, so that the secret key is recovered by the Gaussian elimination. By applying our attack to the candidates submitted to the National Institute of Standards and Technology (NIST), we were able to recover over 99% of the secret keys. Additionally, we propose a countermeasure based on a look-up table. To validate the efficiency of our countermeasure, we implemented it in Lizard and measure its performance. We demonstrated that the proposed countermeasure does not degrade the performance. |
topic |
post-quantum cryptography lattice-based cryptography Gaussian sampling CDT sampling side-channel attack single trace analysis |
url |
http://www.mdpi.com/2076-3417/8/10/1809 |
work_keys_str_mv |
AT suhrikim singletraceanalysisonconstanttimecdtsampleranditscountermeasure AT seokhiehong singletraceanalysisonconstanttimecdtsampleranditscountermeasure |
_version_ |
1725628438105030656 |