Paper 2025/009
Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust
Abstract
Side-channel attacks (SCA) pose a significant threat to cryptographic implementations, including those designed to withstand the computational power of quantum computers. This paper introduces the first side-channel attack on an industry-grade post-quantum cryptography implementation. Specifically, we present a Correlation Power Analysis (CPA) attack targeting the open-source hardware implementation of ML-DSA within a Silicon Root of Trust framework developed through a multi-party collaboration involving leading technology companies. Our attack focuses on the modular reduction process that follows the Number Theoretic Transform-based polynomial pointwise multiplication. By exploiting side-channel leakage from a distinctive unique reduction algorithm and leveraging the zeroization mechanism used to securely erase sensitive information by clearing internal registers, we significantly enhance the attack's efficacy. Our findings reveal that an adversary can extract the secret keys using only 10,000 power traces. With access to these keys, an attacker could forge signatures for certificate generation, thereby compromising the integrity of the root of trust. This work highlights the vulnerabilities of industry-standard root-of-trust systems to side-channel attacks. It underscores the urgent need for robust countermeasures to secure commercially deployed systems against such threats.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Side-channel AttacksML-DSAQuantum-Resistant CryptographyCorrelation Power AnalysisZeroizationRoot-of-Trust.
- Contact author(s)
-
mkarabulut2024 @ fau edu
razarderakhsh @ fau edu - History
- 2025-01-06: revised
- 2025-01-02: received
- See all versions
- Short URL
- https://ia.cr/2025/009
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/009, author = {Merve Karabulut and Reza Azarderakhsh}, title = {Efficient {CPA} Attack on Hardware Implementation of {ML}-{DSA} in Post-Quantum Root of Trust}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/009}, year = {2025}, url = {https://eprint.iacr.org/2025/009} }