Paper 2022/036

Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber

Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, and François-Xavier Standaert

Abstract

The side-channel cryptanalysis of Post-Quantum (PQ) key encapsulation schemes has been a topic of intense activity over the last years. Many attacks have been put forward: Simple Power Analysis (SPAs) against the re-encryption of schemes using the Fujisaki-Okamoto (FO) transform are known to be very powerful; Differential Power Analysis (DPAs) against the decryption are also possible. Yet, to the best of our knowledge, a systematic and quantitative investigation of their impact for designers is still missing. In this paper, we propose to capture these attacks with shortcut formulas in order to compare their respective strength in function of the noise level. Taking the case of Kyber for illustration, we then evaluate the (high) cost of preventing them with masking and the extent to which different parts of an implementation could benefit from varying security levels. We finally discuss tweaks to improve the situation and enable a better leveling of the countermeasures. Our conclusions confirm that current solutions for side-channel secure PQ key encapsulation schemes like Kyber are unlikely to be efficient in low-noise settings without (design or countermeasures) improvements.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. COSADE 2022
Keywords
Side-Channel AttacksPost-Quantum CryptographyKey Encapsulation MechanismFujisaki-Okamoto TransformationMasking
Contact author(s)
olivier bronchain @ uclouvain be
History
2022-02-15: revised
2022-01-14: received
See all versions
Short URL
https://ia.cr/2022/036
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/036,
      author = {Melissa Azouaoui and Olivier Bronchain and Clément Hoffmann and Yulia Kuzovkova and Tobias Schneider and François-Xavier Standaert},
      title = {Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber},
      howpublished = {Cryptology ePrint Archive, Paper 2022/036},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/036}},
      url = {https://eprint.iacr.org/2022/036}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.