[Resource Topic] 2022/1452: A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber

Welcome to the resource topic for 2022/1452

Title:
A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber

Authors: Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund

Abstract:

CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establishment algorithm to be standardized. This makes it important to assess how well CRYSTALS-Kyber implementations withstand side-channel attacks. Software implementations of CRYSTALS-Kyber have been already analyzed and the discovered vulnerabilities were patched in the subsequently released versions. In this paper, we present a profiling side-channel attack on a hardware implementation of CRYSTALS-Kyber with the security parameter k = 3, Kyber768. Since hardware implementations carry out computation in parallel, they are typically more difficult to break than their software counterparts. We demonstrate a successful message (session key) recovery by deep learning-based power analysis. Our results indicate that currently available hardware implementations of CRYSTALS-Kyber need better protection against side-channel attacks.

ePrint: https://eprint.iacr.org/2022/1452

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .