Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/147131
Title: On configurable SCA countermeasures against single trace attacks for the NTT
Authors: Ravi, Prasanna
Poussier, Romain
Bhasin, Shivam
Chattopadhyay, Anupam
Keywords: Engineering::Computer science and engineering
Issue Date: 2020
Source: Ravi, P., Poussier, R., Bhasin, S. & Chattopadhyay, A. (2020). On configurable SCA countermeasures against single trace attacks for the NTT. International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2020), 123-146.
Conference: International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2020)
Abstract: The Number Theoretic Transform (NTT) is a critical subblock used in several structured lattice-based schemes, including Kyber and Dilithium, which are finalist candidates in the NIST’s standardization process for post-quantum cryptography. The NTT was shown to be susceptible to single trace side-channel attacks by Primas et al. in CHES 2017 and Pessl et al. in Latincrypt 2019 who demonstrated full key recovery from single traces on the ARM Cortex-M4 microcontroller. However, the cost of deploying suitable countermeasures to protect the NTT from these attacks on the same target platform has not yet been studied. In this work, we propose novel shuffling and masking countermeasures to protect the NTT from such single trace attacks. Firstly, we exploit arithmetic properties of twiddle constants used within the NTT computation to propose efficient and generic masking strategies for the NTT with configurable SCA resistance. Secondly, we also propose new variants of the shuffling countermeasure with varying granularity for the NTT. We perform a detailed comparative evaluation of the runtime performances for our proposed countermeasures within open source implementations of Kyber and Dilithium from the pqm4 library on the ARM Cortex-M4 microcontroller. Our proposed countermeasures yield a reasonable runtime overhead in the range of 7%–78% across all procedures of Kyber, while the runtime overheads are much more pronounced for Dilithium, ranging from 12%–197% for the key generation procedure and 32%– 490% for the signing procedure.
URI: https://hdl.handle.net/10356/147131
Schools: School of Physical and Mathematical Sciences 
School of Computer Science and Engineering 
Research Centres: Temasek Laboratories @ NTU 
Rights: © 2020 Springer International Publishing AG, part of Springer Nature. All rights reserved.
Fulltext Permission: none
Fulltext Availability: No Fulltext
Appears in Collections:SPMS Conference Papers

Page view(s)

439
Updated on May 7, 2025

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.