{"title":"选择密文的简单功率分析软件8位实现环- lwe加密","authors":"Aesun Park, Dong‐Guk Han","doi":"10.1109/AsianHOST.2016.7835555","DOIUrl":null,"url":null,"abstract":"Post-quantum cryptographic schemes have been developed in response to the rise of quantum computers. Fortunately, several schemes have been developed with quantum resistance. However, it is not surprising that implementations of post-quantum cryptographic schemes are vulnerable to Side Channel Analysis (SCA) attacks because post-quantum cryptographic schemes will require implementation on the same platforms which are widely used in the industrial field. SCA attack method and their countermeasures for code-based post-quantum cryptosystem, such as McEliece, have been investigated. Unfortunately, the investigation of the ring-LWE problem in terms of SCA is as yet insufficient. There has only been limited research on the side-channel vulnerabilities of lattice-based implementations. In this paper, we propose the first Simple Power Analysis (SPA) attack on the ring-LWE encryption scheme. The proposed attack exploits the chosen ciphertext and the vulnerability associated with the modular addition, which is applicable when a ring-LWE encryption scheme operates on 8-bit microcontroller devices. We also identify the vulnerability associated with the modular addition operation of 8-bit implementation. When operating a ring-LWE encryption scheme on an 8-bit device, the secret key can be revealed via this vulnerability using the proposed chosen-ciphertext SPA attack.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":"{\"title\":\"Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption\",\"authors\":\"Aesun Park, Dong‐Guk Han\",\"doi\":\"10.1109/AsianHOST.2016.7835555\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Post-quantum cryptographic schemes have been developed in response to the rise of quantum computers. Fortunately, several schemes have been developed with quantum resistance. However, it is not surprising that implementations of post-quantum cryptographic schemes are vulnerable to Side Channel Analysis (SCA) attacks because post-quantum cryptographic schemes will require implementation on the same platforms which are widely used in the industrial field. SCA attack method and their countermeasures for code-based post-quantum cryptosystem, such as McEliece, have been investigated. Unfortunately, the investigation of the ring-LWE problem in terms of SCA is as yet insufficient. There has only been limited research on the side-channel vulnerabilities of lattice-based implementations. In this paper, we propose the first Simple Power Analysis (SPA) attack on the ring-LWE encryption scheme. The proposed attack exploits the chosen ciphertext and the vulnerability associated with the modular addition, which is applicable when a ring-LWE encryption scheme operates on 8-bit microcontroller devices. We also identify the vulnerability associated with the modular addition operation of 8-bit implementation. When operating a ring-LWE encryption scheme on an 8-bit device, the secret key can be revealed via this vulnerability using the proposed chosen-ciphertext SPA attack.\",\"PeriodicalId\":394462,\"journal\":{\"name\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"27\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsianHOST.2016.7835555\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST.2016.7835555","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption
Post-quantum cryptographic schemes have been developed in response to the rise of quantum computers. Fortunately, several schemes have been developed with quantum resistance. However, it is not surprising that implementations of post-quantum cryptographic schemes are vulnerable to Side Channel Analysis (SCA) attacks because post-quantum cryptographic schemes will require implementation on the same platforms which are widely used in the industrial field. SCA attack method and their countermeasures for code-based post-quantum cryptosystem, such as McEliece, have been investigated. Unfortunately, the investigation of the ring-LWE problem in terms of SCA is as yet insufficient. There has only been limited research on the side-channel vulnerabilities of lattice-based implementations. In this paper, we propose the first Simple Power Analysis (SPA) attack on the ring-LWE encryption scheme. The proposed attack exploits the chosen ciphertext and the vulnerability associated with the modular addition, which is applicable when a ring-LWE encryption scheme operates on 8-bit microcontroller devices. We also identify the vulnerability associated with the modular addition operation of 8-bit implementation. When operating a ring-LWE encryption scheme on an 8-bit device, the secret key can be revealed via this vulnerability using the proposed chosen-ciphertext SPA attack.