Welcome to the resource topic for 2025/1577
Title:
A Template SCA Attack on the Kyber/ML-KEM Pair-Pointwise Multiplication
Authors: Sedric Nkotto
Abstract:Kyber a.k.a ML-KEM has been stardardized by NIST under FIPS-203 and will
definetely in the coming years be implemented in several commercial products.
However the resilience of implementations against side channel attacks is still an open
and practical concern. One of the drawbacks of the ongoing side channel analysis
research related to PQC schemes is the availability of open source datasets. Luckily
some opensource datasets start popping up. For instance the one recently published
by Rezaeezade et al. in [2]. This dataset captures power consumption during a pair-
pointwise multiplication occuring in the course of ML-KEM decapsulation process
and involving the decapsulation (sub)key and ciphertexts. In this paper we present
a template side channel attack targetting that operation, which yields a complete
recovery of the decapsulation secret (sub)key.
ePrint: https://eprint.iacr.org/2025/1577
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .