[Resource Topic] 2024/238: A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium

Welcome to the resource topic for 2024/238

A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium

Authors: Sönke Jendral


CRYSTALS-Dilithium is a post-quantum secure digital signature algorithm currently being standardised by NIST. As a result, devices making use of CRYSTALS-Dilithium will soon become generally available and be deployed in various environments. It is thus important to assess the resistance of CRYSTALS-Dilithum implementations to physical attacks.
In this paper, we present an attack on a CRYSTALS-Dilithium implementation in hedged mode in ARM Cortex-M4 using fault injection. Voltage glitching is performed to skip computation of a seed during the generation of the signature. We identified settings that consistently skip the desired function without crashing the device. After the successful fault injection, the resulting signature allows for the extraction of the secret key vector. Our attack succeeds with probability 0.582 in a single trace.
We also propose countermeasures against the presented attack.

ePrint: https://eprint.iacr.org/2024/238

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .