Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations

Aesun Park, Kyung-Ah Shim, Namhun Koo, Dong‐Guk Han
{"title":"Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations","authors":"Aesun Park, Kyung-Ah Shim, Namhun Koo, Dong‐Guk Han","doi":"10.46586/TCHES.V2018.I3.500-523","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature schemes based on multivariate quadratic equations, which is one of the most promising alternatives for post-quantum signature schemes, against side-channel attacks. We describe correlation power analysis (CPA) on the schemes that yield full secret key recoveries. First, we identify a secret leakage of secret affine maps S and T during matrix-vector products in signing when Rainbow is implemented with equivalent keys rather than random affine maps for optimal implementations. In this case, the simple structure of the equivalent keys leads to the retrieval of the entire secret affine map T. Next, we extend the full secret key recovery to the general case using random affine maps via a hybrid attack: after recovering S by performing CPA, we recover T by mounting algebraic key recovery attacks. We demonstrate how this leakage on Rainbow can be practically exploited on an 8-bit AVR microcontroller using CPA. Consequently, our CPA can be applied to Rainbow-like multi-layered schemes regardless of the use of the simple-structured equivalent keys and UOV-like single layer schemes with the implementations using the equivalent keys of the simple structure. This is the first result on the security of multivariate quadratic equations-based signature schemes using only CPA. Our result can be applied to Rainbow-like multi-layered schemes and UOV-like single layer schemes submitted to NIST for Post-Quantum Cryptography Standardization.","PeriodicalId":321490,"journal":{"name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IACR Transactions on Cryptographic Hardware and Embedded Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46586/TCHES.V2018.I3.500-523","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature schemes based on multivariate quadratic equations, which is one of the most promising alternatives for post-quantum signature schemes, against side-channel attacks. We describe correlation power analysis (CPA) on the schemes that yield full secret key recoveries. First, we identify a secret leakage of secret affine maps S and T during matrix-vector products in signing when Rainbow is implemented with equivalent keys rather than random affine maps for optimal implementations. In this case, the simple structure of the equivalent keys leads to the retrieval of the entire secret affine map T. Next, we extend the full secret key recovery to the general case using random affine maps via a hybrid attack: after recovering S by performing CPA, we recover T by mounting algebraic key recovery attacks. We demonstrate how this leakage on Rainbow can be practically exploited on an 8-bit AVR microcontroller using CPA. Consequently, our CPA can be applied to Rainbow-like multi-layered schemes regardless of the use of the simple-structured equivalent keys and UOV-like single layer schemes with the implementations using the equivalent keys of the simple structure. This is the first result on the security of multivariate quadratic equations-based signature schemes using only CPA. Our result can be applied to Rainbow-like multi-layered schemes and UOV-like single layer schemes submitted to NIST for Post-Quantum Cryptography Standardization.
基于多元二次方程的后量子签名方案侧信道攻击
本文研究了基于多元二次方程的彩虹和不平衡油醋(UOV)签名方案,这是后量子签名方案中最有前途的替代方案之一,对侧信道攻击的安全性。我们描述了产生完整密钥恢复的方案的相关功率分析(CPA)。首先,我们确定了签名中矩阵-向量积过程中秘密仿射映射S和T的秘密泄漏,当使用等效密钥而不是随机仿射映射来实现最佳实现时。在这种情况下,等效密钥的简单结构导致整个秘密仿射映射T的检索。接下来,我们通过混合攻击使用随机仿射映射将完整秘密密钥恢复扩展到一般情况:在通过执行CPA恢复S之后,我们通过安装代数密钥恢复攻击恢复T。我们演示了如何在使用CPA的8位AVR微控制器上实际利用彩虹上的这种泄漏。因此,我们的CPA可以应用于类似彩虹的多层方案,而不需要使用简单结构的等效密钥,也可以应用于类似uov的单层方案,并使用简单结构的等效密钥实现。这是第一个仅使用CPA的基于多元二次方程的签名方案的安全性研究结果。我们的结果可以应用于提交给NIST进行后量子加密标准化的类彩虹多层方案和类uov单层方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信