A side-channel attack on a masked IND-CCA secure saber KEM implementation

79Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long-term secret key from 24 traces using a deep neural network created at the profiling stage. The proposed message recovery approach learns a higher-order model directly, without explicitly extracting random masks at each execution. This eliminates the need for a fully controllable profiling device which is required in previous attacks on masked implementations of LWE/LWR-based PKEs/KEMs. We also present a new secret key recovery approach based on maps from error-correcting codes that can compensate for some errors in the recovered message. In addition, we discovered a previously unknown leakage point in the primitive for masked logical shifting on arithmetic shares.

Cite

CITATION STYLE

APA

Ngo, K., Dubrova, E., Guo, Q., & Johansson, T. (2021). A side-channel attack on a masked IND-CCA secure saber KEM implementation. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(4), 676–707. https://doi.org/10.46586/tches.v2021.i4.676-707

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free