首页 > 最新文献

IACR Cryptol. ePrint Arch.最新文献

英文 中文
Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards Dlog实际上和DH一样难(或容易)——在EC标准上通过DH oracle解决Dlog
Pub Date : 2023-08-31 DOI: 10.46586/tches.v2023.i4.146-166
Alexander May, C. Schneider
Assume that we have a group G of known order q, in which we want to solve discrete logarithms (dlogs). In 1994, Maurer showed how to compute dlogs in G in poly time given a Diffie-Hellman (DH) oracle in G, and an auxiliary elliptic curve ˆÊ (Fq) of smooth order. The problem of Maurer’s reduction of solving dlogs via DH oracles is that no efficient algorithm for constructing such a smooth auxiliary curve is known. Thus, the implications of Maurer’s approach to real-world applications remained widely unclear.In this work, we explicitly construct smooth auxiliary curves for 13 commonly used, standardized elliptic curves of bit-sizes in the range [204, 256], including e.g., NIST P-256, Curve25519, SM2 and GOST R34.10. For all these curves we construct a corresponding cyclic auxiliary curve ˆÊ(Fq), whose order is 39-bit smooth, i.e., its largest factor is of bit-length at most 39 bits.This in turn allows us to compute for all divisors of the order of ˆÊ(Fq) exhaustively a codebook for all discrete logarithms. As a consequence, dlogs on ˆÊ(Fq) can efficiently be computed in a matter of seconds. Our resulting codebook sizes for each auxiliary curve are less than 29 TByte individually, and fit on our hard disk.We also construct auxiliary curves for NIST P-384 and NIST P-521 with a 65-bit and 110-bit smooth order.Further, we provide an efficient implementation of Maurer’s reduction from the dlog computation in G with order q to the dlog computation on its auxiliary curve ˆÊ (Fq). Let us provide a flavor of our results, e.g., when G is the NIST P-256 group, the results for other curves are similar. With the help of our codebook for the auxiliary curve Ê(Fq), and less than 24,000 calls to a DH oracle in G (that we simulate), we can solve discrete logarithms on NIST P-256 in around 30 secs.From a security perspective, our results show that for current elliptic curve standards< the difficulty of solving DH is practically tightly related to the difficulty of computing dlogs. Namely, unless dlogs are easy to compute on these curves G, we provide a very concrete security guarantee that DH in G must also be hard. From a cryptanalytic perspective, our results show a way to efficiently solve discrete logarithms in the presence of a DH oracle.
假设我们有一个已知阶数为q的群G,我们想在其中求解离散对数(dlog)。1994年,Maurer在给定G中的Diffie-Hellman (DH) oracle和光滑阶的辅助椭圆曲线- Ê (Fq)的情况下,展示了如何在多时间内计算G中的log。Maurer通过DH预言机求解log的约简问题是,没有有效的算法来构造这样一个光滑的辅助曲线。因此,Maurer的方法对实际应用的影响仍然很不清楚。在这项工作中,我们明确地构建了13条常用的、位大小的标准化椭圆曲线的光滑辅助曲线,范围为[204,256],包括NIST P-256、Curve25519、SM2和GOST R34.10。对于所有这些曲线,我们构造了相应的循环辅助曲线- Ê(Fq),其阶数为39位光滑,即其最大因子的位长最多为39位。这反过来又使我们能够为所有离散对数详尽地计算出所有≥Ê(Fq)阶的因数的码本。因此,可以在几秒钟内有效地计算出@ Ê(Fq)上的日志。我们得到的每个辅助曲线的码本大小分别小于29 TByte,并且适合我们的硬盘。我们还以65位和110位的平滑顺序为NIST P-384和NIST P-521构建了辅助曲线。此外,我们提供了一种有效的实现,从G中阶为q的dlog计算到其辅助曲线上的dlog计算- Ê (Fq)。让我们提供一下我们的结果,例如,当G是NIST P-256组时,其他曲线的结果是相似的。在辅助曲线Ê(Fq)的代码本的帮助下,在G中对DH oracle的调用少于24000次(我们模拟的),我们可以在大约30秒内解决NIST P-256上的离散对数。从安全的角度来看,我们的研究结果表明,对于目前的椭圆曲线标准,求解DH的难度实际上与计算log的难度密切相关。也就是说,除非在这些曲线G上的log很容易计算,否则我们提供了一个非常具体的安全保证,即G中的DH也必须是硬的。从密码分析的角度来看,我们的结果显示了一种在存在DH oracle的情况下有效解决离散对数的方法。
{"title":"Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards","authors":"Alexander May, C. Schneider","doi":"10.46586/tches.v2023.i4.146-166","DOIUrl":"https://doi.org/10.46586/tches.v2023.i4.146-166","url":null,"abstract":"Assume that we have a group G of known order q, in which we want to solve discrete logarithms (dlogs). In 1994, Maurer showed how to compute dlogs in G in poly time given a Diffie-Hellman (DH) oracle in G, and an auxiliary elliptic curve ˆÊ (Fq) of smooth order. The problem of Maurer’s reduction of solving dlogs via DH oracles is that no efficient algorithm for constructing such a smooth auxiliary curve is known. Thus, the implications of Maurer’s approach to real-world applications remained widely unclear.In this work, we explicitly construct smooth auxiliary curves for 13 commonly used, standardized elliptic curves of bit-sizes in the range [204, 256], including e.g., NIST P-256, Curve25519, SM2 and GOST R34.10. For all these curves we construct a corresponding cyclic auxiliary curve ˆÊ(Fq), whose order is 39-bit smooth, i.e., its largest factor is of bit-length at most 39 bits.This in turn allows us to compute for all divisors of the order of ˆÊ(Fq) exhaustively a codebook for all discrete logarithms. As a consequence, dlogs on ˆÊ(Fq) can efficiently be computed in a matter of seconds. Our resulting codebook sizes for each auxiliary curve are less than 29 TByte individually, and fit on our hard disk.We also construct auxiliary curves for NIST P-384 and NIST P-521 with a 65-bit and 110-bit smooth order.Further, we provide an efficient implementation of Maurer’s reduction from the dlog computation in G with order q to the dlog computation on its auxiliary curve ˆÊ (Fq). Let us provide a flavor of our results, e.g., when G is the NIST P-256 group, the results for other curves are similar. With the help of our codebook for the auxiliary curve Ê(Fq), and less than 24,000 calls to a DH oracle in G (that we simulate), we can solve discrete logarithms on NIST P-256 in around 30 secs.From a security perspective, our results show that for current elliptic curve standards< the difficulty of solving DH is practically tightly related to the difficulty of computing dlogs. Namely, unless dlogs are easy to compute on these curves G, we provide a very concrete security guarantee that DH in G must also be hard. From a cryptanalytic perspective, our results show a way to efficiently solve discrete logarithms in the presence of a DH oracle.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"1 1","pages":"539"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73438212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis 硅回声:非侵入式木马和篡改检测使用频率选择阻抗分析
Pub Date : 2023-08-31 DOI: 10.46586/tches.v2023.i4.238-261
Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat-Safa, Shahin Tajik
The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan insertions are prominent examples of such tamper events. Altering the placement and routing of a design or removing a part of a circuit for side-channel leakage/fault sensitivity amplification are other instances of such attacks. While semi- and fully-invasive physical verification methods can confidently detect such stealthy tamper events, they are costly, time-consuming, and destructive. On the other hand, virtually all proposed non-invasive side-channel methods suffer from noise and, therefore, have low confidence. Moreover, they require activating the tampered part of the circuit (e.g., the Trojan trigger) to compare and detect the modifications. In this work, we introduce a non-invasive post-silicon tamper detection technique applicable to different classes of tamper events at the chip level without requiring the activation of the malicious circuit. Our method relies on the fact that physical modifications (regardless of their physical, activation, or action characteristics) alter the impedance of the chip. Hence, characterizing the impedance can lead to the detection of the tamper events. To sense the changes in the impedance, we deploy known RF tools, namely, scattering parameters, in which we inject sine wave signals with high frequencies to the power distribution network (PDN) of the system and measure the “echo” of the signal. The reflected signals in various frequency bands reveal different tamper events based on their impact size on the die. To validate our claims, we performed measurements on several proof-ofconcept tampered hardware implementations realized on FPGAs manufactured with a 28 nm technology. We further show that deploying the Dynamic Time Warping (DTW) distance can distinguish between tamper events and noise resulting from manufacturing process variation of different chips/boards. Based on the acquired results, we demonstrate that stealthy hardware Trojans, as well as sophisticated modifications of P&R, can be detected.
芯片级篡改的威胁及其检测已经得到了广泛的研究。硬件木马插入是此类篡改事件的突出例子。改变设计的位置和路由或移除电路的一部分用于侧通道泄漏/故障灵敏度放大是此类攻击的其他实例。虽然半侵入性和完全侵入性的物理验证方法可以自信地检测到这种隐蔽的篡改事件,但它们代价高昂、耗时且具有破坏性。另一方面,几乎所有提出的非侵入性侧通道方法都受到噪声的影响,因此置信度较低。此外,它们需要激活电路中被篡改的部分(例如,木马触发器)来比较和检测修改。在这项工作中,我们介绍了一种非侵入性的后硅篡改检测技术,适用于芯片级别的不同类别的篡改事件,而无需激活恶意电路。我们的方法依赖于物理修改(无论其物理,激活或动作特性如何)改变芯片的阻抗。因此,表征阻抗可以导致篡改事件的检测。为了感知阻抗的变化,我们部署了已知的RF工具,即散射参数,其中我们将高频正弦波信号注入系统的配电网络(PDN)并测量信号的“回声”。不同频带的反射信号根据其对模具的影响大小揭示了不同的篡改事件。为了验证我们的说法,我们对在28纳米技术制造的fpga上实现的几个概念验证篡改硬件实现进行了测量。我们进一步表明,部署动态时间翘曲(DTW)距离可以区分由不同芯片/板的制造工艺变化引起的篡改事件和噪声。基于所获得的结果,我们证明了可以检测到隐形硬件木马,以及复杂的P&R修改。
{"title":"Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis","authors":"Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat-Safa, Shahin Tajik","doi":"10.46586/tches.v2023.i4.238-261","DOIUrl":"https://doi.org/10.46586/tches.v2023.i4.238-261","url":null,"abstract":"The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan insertions are prominent examples of such tamper events. Altering the placement and routing of a design or removing a part of a circuit for side-channel leakage/fault sensitivity amplification are other instances of such attacks. While semi- and fully-invasive physical verification methods can confidently detect such stealthy tamper events, they are costly, time-consuming, and destructive. On the other hand, virtually all proposed non-invasive side-channel methods suffer from noise and, therefore, have low confidence. Moreover, they require activating the tampered part of the circuit (e.g., the Trojan trigger) to compare and detect the modifications. In this work, we introduce a non-invasive post-silicon tamper detection technique applicable to different classes of tamper events at the chip level without requiring the activation of the malicious circuit. Our method relies on the fact that physical modifications (regardless of their physical, activation, or action characteristics) alter the impedance of the chip. Hence, characterizing the impedance can lead to the detection of the tamper events. To sense the changes in the impedance, we deploy known RF tools, namely, scattering parameters, in which we inject sine wave signals with high frequencies to the power distribution network (PDN) of the system and measure the “echo” of the signal. The reflected signals in various frequency bands reveal different tamper events based on their impact size on the die. To validate our claims, we performed measurements on several proof-ofconcept tampered hardware implementations realized on FPGAs manufactured with a 28 nm technology. We further show that deploying the Dynamic Time Warping (DTW) distance can distinguish between tamper events and noise resulting from manufacturing process variation of different chips/boards. Based on the acquired results, we demonstrate that stealthy hardware Trojans, as well as sophisticated modifications of P&R, can be detected.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"64 1","pages":"75"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76114050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accountable Safety Implies Finality 负责任的安全意味着最终的结果
Pub Date : 2023-08-31 DOI: 10.48550/arXiv.2308.16902
Joachim Neu, Ertem Nusret Tas, DavidN C. Tse
Motivated by proof-of-stake (PoS) blockchains such as Ethereum, two key desiderata have recently been studied for Byzantine-fault tolerant (BFT) state-machine replication (SMR) consensus protocols: Finality means that the protocol retains consistency, as long as less than a certain fraction of validators are malicious, even in partially-synchronous environments that allow for temporary violations of assumed network delay bounds. Accountable safety means that in any case of inconsistency, a certain fraction of validators can be identified to have provably violated the protocol. Earlier works have developed impossibility results and protocol constructions for these properties separately. We show that accountable safety implies finality, thereby unifying earlier results.
在权益证明(PoS)区块链(如以太坊)的推动下,最近研究了拜占庭容错(BFT)状态机复制(SMR)共识协议的两个关键需求:最终性意味着协议保持一致性,只要少于一定比例的验证器是恶意的,即使在部分同步环境中,允许暂时违反假定的网络延迟界限。可靠的安全性意味着在任何不一致的情况下,可以识别出一定比例的验证者,证明他们违反了协议。早期的工作已经分别开发了这些属性的不可能结果和协议结构。我们表明,可问责的安全意味着最终性,从而统一了先前的结果。
{"title":"Accountable Safety Implies Finality","authors":"Joachim Neu, Ertem Nusret Tas, DavidN C. Tse","doi":"10.48550/arXiv.2308.16902","DOIUrl":"https://doi.org/10.48550/arXiv.2308.16902","url":null,"abstract":"Motivated by proof-of-stake (PoS) blockchains such as Ethereum, two key desiderata have recently been studied for Byzantine-fault tolerant (BFT) state-machine replication (SMR) consensus protocols: Finality means that the protocol retains consistency, as long as less than a certain fraction of validators are malicious, even in partially-synchronous environments that allow for temporary violations of assumed network delay bounds. Accountable safety means that in any case of inconsistency, a certain fraction of validators can be identified to have provably violated the protocol. Earlier works have developed impossibility results and protocol constructions for these properties separately. We show that accountable safety implies finality, thereby unifying earlier results.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"280 1","pages":"1301"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83083995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Provable White-Box Security in the Strong Incompressibility Model 强不可压缩模型中可证明的白盒安全性
Pub Date : 2023-08-31 DOI: 10.46586/tches.v2023.i4.167-187
Estuardo Alpirez Bock, C. Brzuska, Russell W. F. Lai
Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, where a compressed program should not even help to distinguish encryptions of two messages of equal length. Equivalently, the notion can be phrased as indistinguishability under chosen-plaintext attacks and key-leakage (LK-IND-CPA), where the leakage rate is high.In this paper, we show that LK-IND-CPA security with superlogarithmic-length leakage, and thus strong incompressibility, cannot be proven under standard (i.e. single-stage) assumptions, if the encryption scheme is key-fixing, i.e. a polynomial number of message-ciphertext pairs uniquely determine the key with high probability. Our impossibility result refutes a claim by FKKM that their big-key generation mechanism achieves strong incompressibility when combined with any PRG or any conventional encryption scheme, since the claim is not true for encryption schemes which are key-fixing (or for PRGs which are injective). In particular, we prove that the cipher block chaining (CBC) block cipher mode is key-fixing when modelling the cipher as a truly random permutation for each key. Subsequent to and inspired by our work, FKKM prove that their original big-key generation mechanism can be combined with a random oracle into an LK-IND-CPA-secure encryption scheme, circumventing the impossibility result by the use of an idealised model.Along the way, our work also helps clarifying the relations between incompressible white-box cryptography, big-key symmetric encryption, and general leakage resilient cryptography, and their limitations.
不可压缩性是白盒密码学中流行的安全概念,它捕获了大型加密程序无法在不丢失功能的情况下进行压缩。Fouque, Karpman, Kirchner和Minaud (FKKM)定义了强不可压缩性,即压缩后的程序甚至不能帮助区分两个长度相等的消息的加密。同样,这个概念可以表述为在选择明文攻击和密钥泄漏(LK-IND-CPA)下的不可区分性,其中泄漏率很高。在本文中,我们证明了在标准(即单阶段)假设下,如果加密方案是固定密钥的,即多项式个数的消息-密文对以高概率唯一确定密钥,则不能证明具有超对数长度泄漏的LK-IND-CPA安全性,从而具有强不可压缩性。我们的不可能性结果驳斥了FKKM的一个声明,即当与任何PRG或任何传统加密方案结合时,他们的大密钥生成机制实现了强不可压缩性,因为该声明不适用于固定密钥的加密方案(或内射的PRG)。特别是,当将密码建模为每个密钥的真正随机排列时,我们证明了密码块链(CBC)分组密码模式是固定密钥的。在我们工作的启发下,FKKM证明了他们最初的大密钥生成机制可以与随机预言结合成一个lk - ind - cpa安全的加密方案,通过使用理想化的模型来规避不可能的结果。在此过程中,我们的工作还有助于澄清不可压缩白盒加密、大密钥对称加密和一般防泄漏加密之间的关系,以及它们的局限性。
{"title":"On Provable White-Box Security in the Strong Incompressibility Model","authors":"Estuardo Alpirez Bock, C. Brzuska, Russell W. F. Lai","doi":"10.46586/tches.v2023.i4.167-187","DOIUrl":"https://doi.org/10.46586/tches.v2023.i4.167-187","url":null,"abstract":"Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, where a compressed program should not even help to distinguish encryptions of two messages of equal length. Equivalently, the notion can be phrased as indistinguishability under chosen-plaintext attacks and key-leakage (LK-IND-CPA), where the leakage rate is high.In this paper, we show that LK-IND-CPA security with superlogarithmic-length leakage, and thus strong incompressibility, cannot be proven under standard (i.e. single-stage) assumptions, if the encryption scheme is key-fixing, i.e. a polynomial number of message-ciphertext pairs uniquely determine the key with high probability. Our impossibility result refutes a claim by FKKM that their big-key generation mechanism achieves strong incompressibility when combined with any PRG or any conventional encryption scheme, since the claim is not true for encryption schemes which are key-fixing (or for PRGs which are injective). In particular, we prove that the cipher block chaining (CBC) block cipher mode is key-fixing when modelling the cipher as a truly random permutation for each key. Subsequent to and inspired by our work, FKKM prove that their original big-key generation mechanism can be combined with a random oracle into an LK-IND-CPA-secure encryption scheme, circumventing the impossibility result by the use of an idealised model.Along the way, our work also helps clarifying the relations between incompressible white-box cryptography, big-key symmetric encryption, and general leakage resilient cryptography, and their limitations.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"37 1","pages":"1007"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87174083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium 从MLWE到RLWE:随机确定性二锂的微分故障攻击
Pub Date : 2023-08-31 DOI: 10.46586/tches.v2023.i4.262-286
Mohamed ElGhamrawy, M. Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, C. V. Vredendaal
The post-quantum digital signature scheme CRYSTALS-Dilithium has been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and other post-quantum cryptography schemes, on embedded devices raises a new set of challenges, including ones related to performance in terms of speed and memory requirements, but also related to side-channel and fault injection attacks security. In this work, we investigated the latter and describe a differential fault attack on the randomized and deterministic versions of CRYSTALS-Dilithium. Notably, the attack requires a few instructions skips and is able to reduce the MLWE problem that Dilithium is based on to a smaller RLWE problem which can be practically solved with lattice reduction techniques. Accordingly, we demonstrated key recoveries using hints extracted on the secret keys from the same faulted signatures using the LWE with side-information framework introduced by Dachman-Soled et al. at CRYPTO’20. As a final contribution, we proposed algorithmic countermeasures against this attack and in particular showed that the second one can be parameterized to only induce a negligible overhead over the signature generation.
后量子数字签名方案crystals - diliium最近被NIST选择用于标准化。在嵌入式设备上实现crystalsdiliium和其他后量子加密方案提出了一系列新的挑战,包括与速度和内存需求方面的性能相关的挑战,也涉及到侧信道和故障注入攻击的安全性。在这项工作中,我们研究了后者,并描述了对CRYSTALS-Dilithium随机和确定性版本的微分断层攻击。值得注意的是,这种攻击需要一些指令跳过,并且能够将Dilithium基于的MLWE问题减少到一个更小的RLWE问题,可以用晶格约简技术实际解决。因此,我们使用Dachman-Soled等人在CRYPTO ' 20上引入的带有侧信息框架的LWE,使用从相同错误签名的密钥上提取的提示来演示密钥恢复。作为最后的贡献,我们提出了针对这种攻击的算法对策,特别是表明第二种攻击可以参数化,只会在签名生成过程中产生微不足道的开销。
{"title":"From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium","authors":"Mohamed ElGhamrawy, M. Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, C. V. Vredendaal","doi":"10.46586/tches.v2023.i4.262-286","DOIUrl":"https://doi.org/10.46586/tches.v2023.i4.262-286","url":null,"abstract":"The post-quantum digital signature scheme CRYSTALS-Dilithium has been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and other post-quantum cryptography schemes, on embedded devices raises a new set of challenges, including ones related to performance in terms of speed and memory requirements, but also related to side-channel and fault injection attacks security. In this work, we investigated the latter and describe a differential fault attack on the randomized and deterministic versions of CRYSTALS-Dilithium. Notably, the attack requires a few instructions skips and is able to reduce the MLWE problem that Dilithium is based on to a smaller RLWE problem which can be practically solved with lattice reduction techniques. Accordingly, we demonstrated key recoveries using hints extracted on the secret keys from the same faulted signatures using the LWE with side-information framework introduced by Dachman-Soled et al. at CRYPTO’20. As a final contribution, we proposed algorithmic countermeasures against this attack and in particular showed that the second one can be parameterized to only induce a negligible overhead over the signature generation.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"60 1","pages":"1074"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84654431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors 信念传播满足格约简:解密错误后容错密钥恢复的安全性估计
Pub Date : 2023-08-31 DOI: 10.46586/tches.v2023.i4.287-317
Julius Hermelink, Erik Mårtensson, Simona Samardjiska, P. Pessl, G. Rodosek
In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen-ciphertext attack using a fault. When the leaked information is in the form of inequalities, the recovery of the secret key is not trivial. Recent methods use either statistical or algebraic methods (but not both), with some being able to handle incorrect information. Having in mind that integration of the side-channel information is a crucial part of several classes of implementation attacks on LWEbased schemes, it is an important question whether statistically processed information can be successfully integrated in lattice reduction algorithms.We answer this question positively by proposing an error-tolerant combination of statistical and algebraic methods that make use of the advantages of both approaches. The combination enables us to improve upon existing methods – we use both fewer inequalities and are more resistant to errors. We further provide precise security estimates based on the number of available inequalities.Our recovery method applies to several types of implementation attacks in which decryption errors are used in a chosen-ciphertext attack. We practically demonstrate the improved performance of our approach in a key-recovery attack against Kyber with fault-induced decryption errors.
在基于lwe的kem中,观察到的解密错误以方程或不等式的形式泄露了有关密钥的信息。一些实际的故障攻击已经通过直接应用故障或使用故障启用选择的密文攻击来利用这种泄漏。当泄露的信息以不等式的形式出现时,密钥的恢复就不是小事了。最近的方法要么使用统计方法,要么使用代数方法(但不是两者都使用),其中一些方法能够处理不正确的信息。考虑到侧信道信息的集成是几种基于lwe的方案的实现攻击的关键部分,统计处理的信息能否成功地集成到格约简算法中是一个重要的问题。我们通过提出统计和代数方法的容错组合来积极地回答这个问题,这些方法利用了这两种方法的优点。这种结合使我们能够改进现有的方法——我们既使用更少的不等式,又更能抵抗错误。我们进一步根据可用不等式的数量提供精确的安全性估计。我们的恢复方法适用于几种类型的实现攻击,其中在选择的密文攻击中使用了解密错误。我们实际演示了我们的方法在针对具有错误诱导的解密错误的Kyber的密钥恢复攻击中的改进性能。
{"title":"Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors","authors":"Julius Hermelink, Erik Mårtensson, Simona Samardjiska, P. Pessl, G. Rodosek","doi":"10.46586/tches.v2023.i4.287-317","DOIUrl":"https://doi.org/10.46586/tches.v2023.i4.287-317","url":null,"abstract":"In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen-ciphertext attack using a fault. When the leaked information is in the form of inequalities, the recovery of the secret key is not trivial. Recent methods use either statistical or algebraic methods (but not both), with some being able to handle incorrect information. Having in mind that integration of the side-channel information is a crucial part of several classes of implementation attacks on LWEbased schemes, it is an important question whether statistically processed information can be successfully integrated in lattice reduction algorithms.We answer this question positively by proposing an error-tolerant combination of statistical and algebraic methods that make use of the advantages of both approaches. The combination enables us to improve upon existing methods – we use both fewer inequalities and are more resistant to errors. We further provide precise security estimates based on the number of available inequalities.Our recovery method applies to several types of implementation attacks in which decryption errors are used in a chosen-ciphertext attack. We practically demonstrate the improved performance of our approach in a key-recovery attack against Kyber with fault-induced decryption errors.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"34 1","pages":"98"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90112086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era 有限非阿贝尔单群在量子时代密码学中的应用
Pub Date : 2023-08-28 DOI: 10.48550/arXiv.2308.14725
María Isabel González Vasco, Delaram Kahrobaei, E. McKemmie
The theory of finite simple groups is a (rather unexplored) area likely to provide interesting computational problems and modelling tools useful in a cryptographic context. In this note, we review some applications of finite non-abelian simple groups to cryptography and discuss different scenarios in which this theory is clearly central, providing the relevant definitions to make the material accessible to both cryptographers and group theorists, in the hope of stimulating further interaction between these two (non-disjoint) communities. In particular, we look at constructions based on various group-theoretic factorization problems, review group theoretical hash functions, and discuss fully homomorphic encryption using simple groups. The Hidden Subgroup Problem is also briefly discussed in this context.
有限单群理论是一个(相当未被探索的)领域,可能提供有趣的计算问题和在密码学环境中有用的建模工具。在这篇文章中,我们回顾了有限非阿贝尔简单群在密码学中的一些应用,并讨论了该理论显然是中心的不同场景,提供了相关的定义,使密码学家和群理论家都能访问这些材料,希望能促进这两个(非脱节的)群体之间的进一步互动。特别地,我们研究了基于各种群论分解问题的构造,回顾了群论哈希函数,并讨论了使用简单群的完全同态加密。本文还简要讨论了隐子群问题。
{"title":"Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era","authors":"María Isabel González Vasco, Delaram Kahrobaei, E. McKemmie","doi":"10.48550/arXiv.2308.14725","DOIUrl":"https://doi.org/10.48550/arXiv.2308.14725","url":null,"abstract":"The theory of finite simple groups is a (rather unexplored) area likely to provide interesting computational problems and modelling tools useful in a cryptographic context. In this note, we review some applications of finite non-abelian simple groups to cryptography and discuss different scenarios in which this theory is clearly central, providing the relevant definitions to make the material accessible to both cryptographers and group theorists, in the hope of stimulating further interaction between these two (non-disjoint) communities. In particular, we look at constructions based on various group-theoretic factorization problems, review group theoretical hash functions, and discuss fully homomorphic encryption using simple groups. The Hidden Subgroup Problem is also briefly discussed in this context.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"1 1","pages":"1293"},"PeriodicalIF":0.0,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74850782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Implementation and Analysis of DEFAULT DEFAULT的量子实现与分析
Pub Date : 2023-08-23 DOI: 10.1007/s12095-023-00666-y
K. Jang, Anubhab Baksi, J. Breier, Hwajeong Seo, A. Chattopadhyay
{"title":"Quantum Implementation and Analysis of DEFAULT","authors":"K. Jang, Anubhab Baksi, J. Breier, Hwajeong Seo, A. Chattopadhyay","doi":"10.1007/s12095-023-00666-y","DOIUrl":"https://doi.org/10.1007/s12095-023-00666-y","url":null,"abstract":"","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"12 1","pages":"647"},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74464484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Quantum impossible differential attacks: Applications to AES and SKINNY 量子不可能差分攻击:AES和SKINNY的应用
Pub Date : 2023-08-17 DOI: 10.1007/s10623-023-01280-y
Nicolas David, M. Naya-Plasencia, A. Schrottenloher
{"title":"Quantum impossible differential attacks: Applications to AES and SKINNY","authors":"Nicolas David, M. Naya-Plasencia, A. Schrottenloher","doi":"10.1007/s10623-023-01280-y","DOIUrl":"https://doi.org/10.1007/s10623-023-01280-y","url":null,"abstract":"","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"46 10 1","pages":"754"},"PeriodicalIF":0.0,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82745603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Privacy-preserving Central Bank Ledger for Central Bank Digital Currency 用于中央银行数字货币的隐私保护中央银行账本
Pub Date : 2023-08-16 DOI: 10.48550/arXiv.2311.16105
Wang Mong Tikvah Chan
Retail central bank digital currency (rCBDC) is seen as a key upgrade of the monetary system in the 21st century. However, privacy concerns are the main impediment to rCBDC's development and roll-out. On the one hand, the rights of people to keep their transactions private should be protected, including against central bank surveillance. On the other hand, the central bank needs to ensure that no over-issuance of money or other frauds occur, demanding a certain form of knowledge of rCBDC transactions to safeguard against malicious users. This work focuses on rCBDC architectures based on the unspent transaction output (UTXO) data model and tackles the research problem of preserving a sufficient degree of privacy for UTXO transaction records while allowing the central bank to verify their correctness. User privacy is not adequately addressed in the UTXO-based rCBDC architectures. Using evolving public keys as pseudonyms to hide the real identities of users only solves the privacy issue partially. Some information could still be leaked out. This work investigates techniques to address the shortcomings of the pseudonym approach. First, a Pedersen commitment scheme is applied to hide the transaction values of a UTXO transaction while allowing the central bank to verify that no over-issuance of rCBDC has occurred in the transaction.This work uses a Schnorr signature to prove no over-issuance of money, which reduces overheads and enables a non-interactive proof. Then, Coinjoin is applied to aggregate UTXO transactions from different users into one larger UTXO transaction to obfuscate the payer-payee relationship while preserving the correctness of the amount of money flow. This work applies k-anonymity to analyse the privacy guarantee of Coinjoin. By modelling the transaction traffic by a Poisson process, the trade-off between anonymity and transaction confirmation time of Coinjoin is analysed.
零售中央银行数字货币(rCBDC)被视为 21 世纪货币体系升级的关键。然而,隐私问题是 rCBDC 发展和推广的主要障碍。一方面,人们的交易隐私权应受到保护,包括不受中央银行的监控。另一方面,中央银行需要确保不发生超额发行货币或其他欺诈行为,要求对 rCBDC 交易有一定程度的了解,以防范恶意用户。这项工作的重点是基于未支出交易输出(UTXO)数据模型的 rCBDC 架构,解决的研究问题是在允许中央银行验证其正确性的同时,为 UTXO 交易记录保留足够程度的隐私。基于 UTXO 的 rCBDC 架构没有充分解决用户隐私问题。使用不断演变的公钥作为假名来隐藏用户的真实身份只能部分解决隐私问题。一些信息仍有可能泄露。这项工作研究了解决假名方法缺点的技术。首先,应用 Pedersen 承诺方案来隐藏 UTXO 交易的交易值,同时允许中央银行验证交易中没有发生 rCBDC 超额发行的情况。这项工作使用 Schnorr 签名来证明没有发生货币超发,从而减少了开销,并实现了非交互式证明。然后,应用 Coinjoin 将不同用户的 UTXO 交易聚合成一个更大的 UTXO 交易,以混淆付款人和收款人的关系,同时保持资金流金额的正确性。这项工作应用 k 匿名性来分析 Coinjoin 的隐私保证。通过对交易流量进行泊松过程建模,分析了 Coinjoin 在匿名性和交易确认时间之间的权衡。
{"title":"A Privacy-preserving Central Bank Ledger for Central Bank Digital Currency","authors":"Wang Mong Tikvah Chan","doi":"10.48550/arXiv.2311.16105","DOIUrl":"https://doi.org/10.48550/arXiv.2311.16105","url":null,"abstract":"Retail central bank digital currency (rCBDC) is seen as a key upgrade of the monetary system in the 21st century. However, privacy concerns are the main impediment to rCBDC's development and roll-out. On the one hand, the rights of people to keep their transactions private should be protected, including against central bank surveillance. On the other hand, the central bank needs to ensure that no over-issuance of money or other frauds occur, demanding a certain form of knowledge of rCBDC transactions to safeguard against malicious users. This work focuses on rCBDC architectures based on the unspent transaction output (UTXO) data model and tackles the research problem of preserving a sufficient degree of privacy for UTXO transaction records while allowing the central bank to verify their correctness. User privacy is not adequately addressed in the UTXO-based rCBDC architectures. Using evolving public keys as pseudonyms to hide the real identities of users only solves the privacy issue partially. Some information could still be leaked out. This work investigates techniques to address the shortcomings of the pseudonym approach. First, a Pedersen commitment scheme is applied to hide the transaction values of a UTXO transaction while allowing the central bank to verify that no over-issuance of rCBDC has occurred in the transaction.This work uses a Schnorr signature to prove no over-issuance of money, which reduces overheads and enables a non-interactive proof. Then, Coinjoin is applied to aggregate UTXO transactions from different users into one larger UTXO transaction to obfuscate the payer-payee relationship while preserving the correctness of the amount of money flow. This work applies k-anonymity to analyse the privacy guarantee of Coinjoin. By modelling the transaction traffic by a Poisson process, the trade-off between anonymity and transaction confirmation time of Coinjoin is analysed.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"40 1","pages":"1496"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139350365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IACR Cryptol. ePrint Arch.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1