Back to Search Start Over

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste

Authors :
Dubrova, Elena
Ngo, Kalle
Gärtner, Joel
Wang, Ruize
Dubrova, Elena
Ngo, Kalle
Gärtner, Joel
Wang, Ruize
Publication Year :
2023

Abstract

CRYSTALS-Kyber has been selected by the NIST as a public-key encryption and key encapsulation mechanism to be standardized. It is also included in the NSA's suite of cryptographic algorithms recommended for national security systems. This makes it important to evaluate the resistance of CRYSTALS-Kyber's implementations to side-channel attacks. The unprotected and first-order masked software implementations have been already analysed. In this paper, we present deep learning-based message recovery attacks on the omega-order masked implementations of CRYSTALS-Kyber in ARM Cortex-M4 CPU for omega <= 5. The main contribution is a new neural network training method called recursive learning. In the attack on an omega-order masked implementation, we start training from an artificially constructed neural network M-omega whose weights are partly copied from a model M omega-1 trained on the (omega - 1)-order masked implementation, and then extended to one more share. Such a method allows us to train neural networks that can recover a message bit with the probability above 99% from high-order masked implementations.<br />QC 20230824

Details

Database :
OAIster
Notes :
English
Publication Type :
Electronic Resource
Accession number :
edsoai.on1400072051
Document Type :
Electronic Resource
Full Text :
https://doi.org/10.1145.3591866.3593072