CryptoDB
How We Broke a Fifth-Order Masked Kyber Implementation by Copy-Paste
Authors: | |
---|---|
Download: | |
Presentation: | Slides |
Abstract: | CRYSTALS-Kyber has been recently selected by the NIST as a post-quantum public-key encryption and key-establishment algorithm to be standardized. This makes it important to assess how well CRYSTALS-Kyber implementations withstand side-channel attacks. The first-order masked implementations of CRYSTALS-Kyber have been already analyzed. In this talk, we will present a side-channel attack on a higher-order masked implementation of CRYSTALS-Kyber. We will show how to recover messages from up to the fifth-order masked implementations of CRYSTALS-Kyber in ARM Cortex-M4 CPU by a deep learning-based power analysis. The talk is expected to be of interest to industry which is currently preparing for a shift to quantum-resistant cryptographic algorithms. |
Video: | https://youtu.be/rf63D1fdOJM?t=3 |
BibTeX
@misc{rwc-2023-35434, title={How We Broke a Fifth-Order Masked Kyber Implementation by Copy-Paste}, note={Video at \url{https://youtu.be/rf63D1fdOJM?t=3}}, howpublished={Talk given at RWC 2023}, author={Elena Dubrova and Kalle Ngo and Joel Gärtner}, year=2023 }