Welcome to the resource topic for 2024/2046
Title:
Decompressing Dilithium’s Public Key with Fewer Signatures Using Side Channel Analysis
Authors: Ruize Wang, Joel Gärtner, Elena Dubrova
Abstract:The CRYSTALS-Dilithium digital signature scheme, selected by NIST as a post-quantum cryptography (PQC) standard under the name ML-DSA, employs a public key compression technique intended for performance optimization. Specifically, the module learning with error instance ({\bf A}, {\bf t}) is compressed by omitting the low-order bits {\bf t_0} of the vector {\bf t}. It was recently shown that knowledge of {\bf t_0} enables more effective side-channel attacks on Dilithium implementations. Another recent work demonstrated a method for reconstructing {\bf t_0} from multiple signatures. In this paper, we build on this method by applying profiled deep learning-assisted side-channel analysis to partially recover the least significant bit of {\bf t_0} from power traces. As a result, the number of signatures required for the reconstruction of {\bf t_0} can be reduced by roughly half. We demonstrate how the new {\bf t_0} reconstruction method enhances the efficiency of recovering the secret key component {\bf s}_1, and thus facilitates digital signature forgery, on an ARM Cortex-M4 implementation of Dilithium.
ePrint: https://eprint.iacr.org/2024/2046
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .