[Resource Topic] 2025/195: Finding a polytope: A practical fault attack against Dilithium

Welcome to the resource topic for 2025/195

Title:
Finding a polytope: A practical fault attack against Dilithium

Authors: Paco Azevedo-Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin

Abstract:

In Dilithium, the rejection sampling step is crucial for the proof of security and correctness of the scheme. However, to our knowledge, there is no attack in the literature that takes advantage of an attacker knowing rejected signatures. The aim of this paper is to create a practical black-box attack against Dilithium with a weakened rejection sampling. We succeed in showing that an adversary with enough rejected signatures can recover Dilithium’s secret key in less than half an hour on a desktop computer. There is one possible application for this result: by physically preventing one of the rejection sampling tests from happening, we obtain two fault attacks against Dilithium.

ePrint: https://eprint.iacr.org/2025/195

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .