旁道攻击
计算机科学
密码学
现场可编程门阵列
符号
实施
功率分析
NIST公司
钥匙(锁)
软件
嵌入式系统
计算机硬件
理论计算机科学
计算机工程
算法
算术
数学
程序设计语言
操作系统
自然语言处理
作者
Yiqiang Zhao,Shijian Pan,Haocheng Ma,Ya Gao,Xintong Song,Jiaji He,Yier Jin
出处
期刊:IEEE Transactions on Circuits and Systems I-regular Papers
[Institute of Electrical and Electronics Engineers]
日期:2023-07-07
卷期号:70 (12): 5025-5035
被引量:5
标识
DOI:10.1109/tcsi.2023.3288600
摘要
The emergence of quantum computing and its impact on current cryptographic algorithms has triggered the migration to post-quantum cryptography (PQC). Among the PQC candidates, CRYSTALS-Kyber is a key encapsulation mechanism (KEM) that stands out from the National Institute of Standards and Technology (NIST) standardization project. While software implementations of Kyber have been developed and evaluated recently, Kyber's hardware implementations especially those designed with parallel architecture, are rarely discussed. To help better understand Kyber hardware designs and their security against side-channel analysis (SCA) attacks, in this paper, we first adapt the two most recent Kyber hardware designs for FPGA implementations. We then perform SCA attacks against these hardware designs with different architectures, i.e., parallelization and pipelining. Our experimental results show that Kyber designs on FPGA boards are vulnerable to SCA attacks including electromagnetic (EM) and power side channels. An attacker only needs $27 \sim 1,600$ power traces or $60 \sim 2,680$ EM traces to recover the decryption key successfully. Furthermore, we propose two first-order IND-CPA Kyber decapsulation masking protected designs, and then we evaluate their securities and overheads. The experimental results demonstrate that the side channel security of masked Kyber designs has increased by more than 10x.
科研通智能强力驱动
Strongly Powered by AbleSci AI