loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Julien Maillard 1 ; 2 ; Thomas Hiscock 1 ; Maxime Lecomte 1 and Christophe Clavier 2

Affiliations: 1 Univ. Grenoble Alpes, CEA-LETI, Minatec Campus, f-38054 Grenoble, France ; 2 Univ. Limoges, XLIM-MATHIS, Limoges, France

Keyword(s): Keccak, Side-Channel Attacks, SASCA, Kyber, Dilithium.

Abstract: Keccak is a standard hashing algorithm that is used in cryptographic protocols as Pseudo Random Functions (PRF), as Pseudo Random Number Generator (PRNG), to check data integrity or to create a Hash-based Message Authentication Code (HMAC). In many cryptographic constructions, secret data is processed with hashing functions. In these cases, recovering the input given to the hashing algorithm allows retrieving secret data. In this paper, we investigate the application of Soft Analytical Side-Channel Attacks (SASCA), based on a Belief Propagation (BP) framework, to recover the input of SHA-3 instances. Thanks to a simulation framework, we extend existing work on the Keccak-f permutation function by developing a comprehensive study of the attacker’s recovery capacity depending on the hash function variant. Then, we study the security implications of SASCA on cryptosystems performing multiple calls to hashing functions with inputs derived from the same secret data. We show that such cons tructions can be exploited efficiently by an attacker and show typical use-cases by targeting Kyber’s encryption routine and Dilithium’s signing routine. We also show that increasing Kyber’s security parameters implies weaker security against SASCA. Finally, our study gives insights about the minimal bit-level classification accuracy required for successful SASCA on Keccak. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.15.182.201

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Maillard, J., Hiscock, T., Lecomte, M. and Clavier, C. (2024). Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes. In Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-709-2; ISSN 2184-7711, SciTePress, pages 518-527. DOI: 10.5220/0012787200003767

@conference{secrypt24,
author={Julien Maillard and Thomas Hiscock and Maxime Lecomte and Christophe Clavier},
title={Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT},
year={2024},
pages={518-527},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012787200003767},
isbn={978-989-758-709-2},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT
TI - Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes
SN - 978-989-758-709-2
IS - 2184-7711
AU - Maillard, J.
AU - Hiscock, T.
AU - Lecomte, M.
AU - Clavier, C.
PY - 2024
SP - 518
EP - 527
DO - 10.5220/0012787200003767
PB - SciTePress