International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

How We Broke a Fifth-Order Masked Kyber Implementation by Copy-Paste

Authors:
Elena Dubrova
Kalle Ngo
Joel Gärtner
Download:
Search ePrint
Search Google
Presentation: Slides
Abstract: CRYSTALS-Kyber has been recently selected by the NIST as a post-quantum public-key encryption and key-establishment algorithm to be standardized. This makes it important to assess how well CRYSTALS-Kyber implementations withstand side-channel attacks. The first-order masked implementations of CRYSTALS-Kyber have been already analyzed. In this talk, we will present a side-channel attack on a higher-order masked implementation of CRYSTALS-Kyber. We will show how to recover messages from up to the fifth-order masked implementations of CRYSTALS-Kyber in ARM Cortex-M4 CPU by a deep learning-based power analysis. The talk is expected to be of interest to industry which is currently preparing for a shift to quantum-resistant cryptographic algorithms.
Video: https://youtu.be/rf63D1fdOJM?t=3
BibTeX
@misc{rwc-2023-35434,
  title={How We Broke a Fifth-Order Masked Kyber Implementation by Copy-Paste},
  note={Video at \url{https://youtu.be/rf63D1fdOJM?t=3}},
  howpublished={Talk given at RWC 2023},
  author={Elena Dubrova and Kalle Ngo and Joel Gärtner},
  year=2023
}