Paper 2021/1622

Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber

Jeroen Delvaux, Technology Innovation Institute
Abstract

At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack against Kyber in which a system of linear inequalities over the private key is generated and solved. The attack requires a laser and is, understandably, demonstrated with simulations—not actual equipment. We facilitate and diversify the attack in four ways, thereby admitting cheaper and more forgiving fault-injection setups. Firstly, the attack surface is enlarged: originally, the two input operands of the ciphertext comparison are covered, and we additionally cover re-encryption modules such as binomial sampling and butterflies in the last layer of the inverse number-theoretic transform (INTT). This extra surface also allows an attacker to bypass the custom countermeasure that was proposed in the Indocrypt paper. Secondly, the fault model is relaxed: originally, precise bit flips are required, and we additionally support set-to-0 faults, random faults, arbitrary bit flips, and instruction skips. Thirdly, masking and blinding methods that randomize intermediate variables kindly help our attack, whereas the IndoCrypt attack is like most other fault attacks either hindered or unaltered by countermeasures against passive side-channel analysis (SCA). Randomization helps because we randomly fault intermediate prime-field elements until a desired set of values is hit. If these prime-field elements are represented on a circle, which is a common visualization, our attack is analogous to spinning a roulette wheel until the ball lands in a desired set of pockets. Hence, the nickname. Fourthly, we accelerate and improve the error tolerance of solving the system of linear inequalities: run times of roughly 100 minutes are reduced to roughly one minute, and inequality error rates of roughly 1% are relaxed to roughly 25%. Benefiting from the four advances above, we use a reasonably priced ChipWhisperer board to break a masked implementation of Kyber running on an ARM Cortex-M4 through clock glitching.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Fault Attack Kyber Key-Encapsulation Mechanism Lattice-Based Cryptography Post-Quantum Cryptography
Contact author(s)
jeroen delvaux @ tii ae
History
2022-08-08: last of 3 revisions
2021-12-14: received
See all versions
Short URL
https://ia.cr/2021/1622
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1622,
      author = {Jeroen Delvaux},
      title = {Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber},
      howpublished = {Cryptology ePrint Archive, Paper 2021/1622},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/1622}},
      url = {https://eprint.iacr.org/2021/1622}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.