ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. シンポジウム
  2. シンポジウムシリーズ
  3. コンピュータセキュリティシンポジウム
  4. 2024

Improved Power Analysis on CRYSTALS-Kyber

https://ipsj.ixsq.nii.ac.jp/records/240933
https://ipsj.ixsq.nii.ac.jp/records/240933
48019914-f31c-4c68-a4cc-e62351a2f41c
名前 / ファイル ライセンス アクション
IPSJ-CSS2024187.pdf IPSJ-CSS2024187.pdf (260.9 kB)
 2026年10月15日からダウンロード可能です。
Copyright (c) 2024 by the Information Processing Society of Japan
非会員:¥660, IPSJ:学会員:¥330, CSEC:会員:¥0, SPT:会員:¥0, DLIB:会員:¥0
Item type Symposium(1)
公開日 2024-10-15
タイトル
言語 en
タイトル Improved Power Analysis on CRYSTALS-Kyber
タイトル
言語 en
タイトル Improved Power Analysis on CRYSTALS-Kyber
言語
言語 eng
キーワード
主題Scheme Other
主題 CRYSTALS-Kyber, Lattice, Side-channel attack, Embedding technique
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
東京大学
著者所属
東京大学/産業技術総合研究所
著者所属(英)
en
The University of Tokyo
著者所属(英)
en
The University of Tokyo / National Institute of Advanced Industrial Science and Technology
著者名 Yen-Ting, Kuo

× Yen-Ting, Kuo

Yen-Ting, Kuo

Search repository
Atsushi, Takayasu

× Atsushi, Takayasu

Atsushi, Takayasu

Search repository
著者名(英) Yen-Ting, Kuo

× Yen-Ting, Kuo

en Yen-Ting, Kuo

Search repository
Atsushi, Takayasu

× Atsushi, Takayasu

en Atsushi, Takayasu

Search repository
論文抄録
内容記述タイプ Other
内容記述 Kuo and Takayasu (ICISC 2023) proposed a two-step attack on CRYSTALS-Kyber. First, they recovered some portions of secret keys using correlation power analysis (CPA). Next, they showed that the remaining secrets can be recovered by solving the learning with errors (LWE) problem. They used the standard Kannan’s embedding in the second step and concluded that 200 traces in the first step were sufficient for recovering whole secret keys. Later, they improved their second step in SCIS 2024 and showed that 100 traces are sufficient for the first step. The core observation is that, in addition to some portions of secret keys, the first step can recover more portions of noisy secret keys that Kuo and Takayasu did not use in the second step. In this paper, we combine the improved lattice attack with the prediction function proposed by Tosun et al., allowing us to carry out the same attack on masked Kyber. Since the prediction function is an even function, making it impossible to distinguish the sign of each coefficient. However, our lattice attack requires only 59 or 63 absolute values of coefficients to be recovered through CPA, which can be achieved with roughly 700 traces. This shows a significant improvement over previous attacks on the masked version of Kyber. Additionally, we discovered that using a technique called negative correlation, which reduces the ambiguity of negative coefficients, only 50 traces are necessary to achieve full-key recovery on unprotected Kyber.
論文抄録(英)
内容記述タイプ Other
内容記述 Kuo and Takayasu (ICISC 2023) proposed a two-step attack on CRYSTALS-Kyber. First, they recovered some portions of secret keys using correlation power analysis (CPA). Next, they showed that the remaining secrets can be recovered by solving the learning with errors (LWE) problem. They used the standard Kannan's embedding in the second step and concluded that 200 traces in the first step were sufficient for recovering whole secret keys. Later, they improved their second step in SCIS 2024 and showed that 100 traces are sufficient for the first step. The core observation is that, in addition to some portions of secret keys, the first step can recover more portions of noisy secret keys that Kuo and Takayasu did not use in the second step. In this paper, we combine the improved lattice attack with the prediction function proposed by Tosun et al., allowing us to carry out the same attack on masked Kyber. Since the prediction function is an even function, making it impossible to distinguish the sign of each coefficient. However, our lattice attack requires only 59 or 63 absolute values of coefficients to be recovered through CPA, which can be achieved with roughly 700 traces. This shows a significant improvement over previous attacks on the masked version of Kyber. Additionally, we discovered that using a technique called negative correlation, which reduces the ambiguity of negative coefficients, only 50 traces are necessary to achieve full-key recovery on unprotected Kyber.
書誌情報 コンピュータセキュリティシンポジウム2024論文集

p. 1401-1408, 発行日 2024-10-15
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 07:48:12.835675
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3