Header menu link for other important links
X
Exploiting determinism in lattice-based signatures practical fault attacks on pqm4 implementations of NIST candidates
Prasanna Ravi, , James Howe, Anupam Chattopadhyay, Shivam Bhasin
Published in
2019
Pages: 427 - 440
Abstract
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes. In particular, we extend the practicality of skip-addition fault attacks through exploitation of determinism in Dilithium and qTESLA signature schemes, which are two leading candidates for the NIST standardization of post-quantum cryptography. We show that single targeted faults injected in the signing procedure allow to recover an important portion of the secret key. Though faults injected in the signing procedure do not recover all the secret key elements, we propose a novel forgery algorithm that allows the attacker to sign any given message with only the extracted portion of the secret key. We perform experimental validation of our attack using Electromagnetic fault injection on reference implementations taken from the pqm4 library, a benchmarking and testing framework for post quantum cryptographic implementations for the ARM Cortex-M4 microcontroller. We also show that our attacks break two well known countermeasures known to protect against skip-addition fault attacks. We further propose an efficient mitigation strategy against our attack that exponentially increases the attacker's complexity at almost zero increase in computational complexity.
About the journal
JournalAsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security