[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?

Paper 2024/2043

Efficient Error-tolerant Side-channel Attacks on GPV Signatures Based on Ordinary Least Squares Regression

Jaesang Noh, Hanyang University
Dongwoo Han, Hanyang University
Dong-Joon Shin, Hanyang University
Abstract

The Gentry-Peikert-Vaikuntanathan (GPV) framework is utilized for constructing digital signatures, which is proven to be secure in the classical/quantum random-oracle model. Falcon is such a signature scheme, recognized as a compact and efficient signature among NIST-standardized signature schemes. Although a signature scheme based on the GPV framework is theoretically highly secure, it could be vulnerable to side-channel attacks and hence further research on physical attacks is required to make a robust signature scheme. We propose a general secret key recovery attack on GPV signatures using partial information about signatures obtained from side-channel attack. The three main contributions are summarized as follows. First, we introduce, for the first time, a concept of vulnerable partial information of GPV signatures and propose a secret key recovery attack, called OLS attack, which effectively utilizes partial information. In contrast to the approaches of Guerreau et al. (CHES 2022) and Zhang et al. (Eurocrypt 2023), which utilize filtered (or processed) signatures with hidden parallelepiped or learning slice schemes, the OLS attack leverages all the available signatures without filtering. We prove that the secret key recovered by the OLS attack converges to the real secret key in probability as the number of samples increases. Second, we utilize Gaussian leakage as partial information for the OLS attack on Falcon. As a result, the OLS attack shows a significantly higher success rate with fewer samples than the existing attack schemes. Furthermore, by incorporating the DDGR attack, the OLS attack can recover the secret key using much less samples with a success rate close to 100%. Moreover, we propose more efficient OLS attack on Falcon, which reduces the number of required side-channel attacks. Third, we propose an error-tolerant power analysis attack using MAP decoding, which effectively corrects the errors in samples to utilize Gaussian leakage correctly. In conclusion, the OLS attack is expected to strengthen the security of the GPV signatures including Falcon.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
GPV frameworkFalconSide channel attackPower analysis attackSignatureGaussian samplerOrdinary least squares
Contact author(s)
darkelzm @ hanyang ac kr
hdw0131 @ hanyang ac kr
djshin @ hanyang ac kr
History
2024-12-18: approved
2024-12-18: received
See all versions
Short URL
https://ia.cr/2024/2043
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/2043,
      author = {Jaesang Noh and Dongwoo Han and Dong-Joon Shin},
      title = {Efficient Error-tolerant Side-channel Attacks on {GPV} Signatures Based on Ordinary Least Squares Regression},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/2043},
      year = {2024},
      url = {https://eprint.iacr.org/2024/2043}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.