Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure

The Gaussian sampler is an integral part in lattice-based cryptography as it has a direct connection to security and efficiency. Although it is theoretically secure to use the Gaussian sampler, the security of its implementation is an open issue. Therefore, researchers have started to investigate th...

Full description

Bibliographic Details
Main Authors: Suhri Kim, Seokhie Hong
Format: Article
Language:English
Published: MDPI AG 2018-10-01
Series:Applied Sciences
Subjects:
Online Access:http://www.mdpi.com/2076-3417/8/10/1809
id doaj-a91a211365c04de6a786dd9a208147ec
record_format Article
spelling doaj-a91a211365c04de6a786dd9a208147ec2020-11-24T23:04:56ZengMDPI AGApplied Sciences2076-34172018-10-01810180910.3390/app8101809app8101809Single Trace Analysis on Constant Time CDT Sampler and Its CountermeasureSuhri Kim0Seokhie Hong1Center for Information Security Technologies (CIST), Korea University, Seoul 02841, KoreaCenter for Information Security Technologies (CIST), Korea University, Seoul 02841, KoreaThe Gaussian sampler is an integral part in lattice-based cryptography as it has a direct connection to security and efficiency. Although it is theoretically secure to use the Gaussian sampler, the security of its implementation is an open issue. Therefore, researchers have started to investigate the security of the Gaussian sampler against side-channel attacks. Since the performance of the Gaussian sampler directly affects the performance of the overall cryptosystem, countermeasures considering only timing attacks are applied in the literature. In this paper, we propose the first single trace power analysis attack on a constant-time cumulative distribution table (CDT) sampler used in lattice-based cryptosystems. From our analysis, we were able to recover every sampled value in the key generation stage, so that the secret key is recovered by the Gaussian elimination. By applying our attack to the candidates submitted to the National Institute of Standards and Technology (NIST), we were able to recover over 99% of the secret keys. Additionally, we propose a countermeasure based on a look-up table. To validate the efficiency of our countermeasure, we implemented it in Lizard and measure its performance. We demonstrated that the proposed countermeasure does not degrade the performance.http://www.mdpi.com/2076-3417/8/10/1809post-quantum cryptographylattice-based cryptographyGaussian samplingCDT samplingside-channel attacksingle trace analysis
collection DOAJ
language English
format Article
sources DOAJ
author Suhri Kim
Seokhie Hong
spellingShingle Suhri Kim
Seokhie Hong
Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure
Applied Sciences
post-quantum cryptography
lattice-based cryptography
Gaussian sampling
CDT sampling
side-channel attack
single trace analysis
author_facet Suhri Kim
Seokhie Hong
author_sort Suhri Kim
title Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure
title_short Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure
title_full Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure
title_fullStr Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure
title_full_unstemmed Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure
title_sort single trace analysis on constant time cdt sampler and its countermeasure
publisher MDPI AG
series Applied Sciences
issn 2076-3417
publishDate 2018-10-01
description The Gaussian sampler is an integral part in lattice-based cryptography as it has a direct connection to security and efficiency. Although it is theoretically secure to use the Gaussian sampler, the security of its implementation is an open issue. Therefore, researchers have started to investigate the security of the Gaussian sampler against side-channel attacks. Since the performance of the Gaussian sampler directly affects the performance of the overall cryptosystem, countermeasures considering only timing attacks are applied in the literature. In this paper, we propose the first single trace power analysis attack on a constant-time cumulative distribution table (CDT) sampler used in lattice-based cryptosystems. From our analysis, we were able to recover every sampled value in the key generation stage, so that the secret key is recovered by the Gaussian elimination. By applying our attack to the candidates submitted to the National Institute of Standards and Technology (NIST), we were able to recover over 99% of the secret keys. Additionally, we propose a countermeasure based on a look-up table. To validate the efficiency of our countermeasure, we implemented it in Lizard and measure its performance. We demonstrated that the proposed countermeasure does not degrade the performance.
topic post-quantum cryptography
lattice-based cryptography
Gaussian sampling
CDT sampling
side-channel attack
single trace analysis
url http://www.mdpi.com/2076-3417/8/10/1809
work_keys_str_mv AT suhrikim singletraceanalysisonconstanttimecdtsampleranditscountermeasure
AT seokhiehong singletraceanalysisonconstanttimecdtsampleranditscountermeasure
_version_ 1725628438105030656