Title:
Signature Correction Attacks on Post-quantum Schemes
Abstract:
After a six year long competition in July the US NIST announced the first four quantum resistant algorithms considered for standardization: Crystals-Kyber is a KEM, and signature schemes Crystals-Dilithium, Falcon and SPHINCS+. As companies prepare to deploy these newly standardized schemes, it becomes essential to secure implementations against side-channel attacks. Indeed many NIST submissions already included constant-time implementations for this very reason.
In this talk we outline a new class of fault injection attacks, collectively called Signature Correction Attacks (SCA), targeting post-quantum signature schemes. While SCA works with many fault mechanisms, it becomes especially effective on platforms vulnerable to Rowhammer thus yielding a software only attack. We outline two SCA attack results targeting LUOV and Crystals-Dilithium using Rowhammer on their reference implementations. We also outline the additional processing steps required to amplify the recovered partial information to full key recovery.
Recording: https://www.youtube.com/watch?v=YlzTe_bQZeI
Speaker:
Prof. Dr. Berk Sunar
Vernam Lab
Worcester Polytechnic Institute
Wednesday, October 19, 2022
16:00-17:00 CEST
Room: Online (Webex)
and
ITSC meeting room, house 64, 1st floor, room 035