实施
计算机科学
密码学
加密
人工神经网络
NIST公司
一套
公钥密码术
软件
软件实现
钥匙(锁)
计算机安全
计算机网络
人工智能
操作系统
语音识别
程序设计语言
考古
历史
作者
Elena Dubrova,Kalle Ngo,Joel Gärtner,Ruize Wang
标识
DOI:10.1145/3591866.3593072
摘要
CRYSTALS-Kyber has been selected by the NIST as a public-key encryption and key encapsulation mechanism to be standardized. It is also included in the NSA’s suite of cryptographic algorithms recommended for national security systems. This makes it important to evaluate the resistance of CRYSTALS-Kyber’s implementations to side-channel attacks. The unprotected and first-order masked software implementations have been already analysed. In this paper, we present deep learning-based message recovery attacks on the ω -order masked implementations of CRYSTALS-Kyber in ARM Cortex-M4 CPU for ω ≤ 5. The main contribution is a new neural network training method called recursive learning. In the attack on an ω -order masked implementation, we start training from an artificially constructed neural network Mω whose weights are partly copied from a model Mω − 1 trained on the (ω − 1)-order masked implementation, and then extended to one more share. Such a method allows us to train neural networks that can recover a message bit with the probability above 99% from high-order masked implementations.
科研通智能强力驱动
Strongly Powered by AbleSci AI