[Resource Topic] 2024/1850: Single-trace side-channel attacks on MAYO exploiting leaky modular multiplication

Welcome to the resource topic for 2024/1850

Title:
Single-trace side-channel attacks on MAYO exploiting leaky modular multiplication

Authors: Sönke Jendral, Elena Dubrova

Abstract:

In response to the quantum threat, new post-quantum cryptographic algorithms will soon be deployed to replace existing public-key schemes. MAYO is a quantum-resistant digital signature scheme whose small keys and signatures make it suitable for widespread adoption, including on embedded platforms with limited security resources. This paper demonstrates two single-trace side-channel attacks on a MAYO implementation in ARM Cortex-M4 that recover a secret key with probabilities of 99.9% and 91.6%, respectively. Both attacks use deep learning-assisted power analysis exploiting information leakage during modular multiplication to reveal a vector in the oil space. This vector is then extended to a full secret key using algebraic techniques.

ePrint: https://eprint.iacr.org/2024/1850

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .