Cache-Timing Attack on the SEAL Homomorphic Encryption Library - Equipe Communications numériques Accéder directement au contenu
Communication Dans Un Congrès Année : 2022

Cache-Timing Attack on the SEAL Homomorphic Encryption Library

Résumé

Homomorphic encryption (HE) ensures provable secrecy of data processed in the ciphertext domain. However, it happens that FHE private-key algorithms can be broken by side-channel attacks. We disclose a novel cache-timing attack on the SEAL open-source HE library. It is triggered by a non-constant time Barrett modular multiplication, which is one of the building blocks in SEAL. We both analyze the mathematical conditions upon which the leakage occurs and show the experimental feasibility of the attack.
Fichier principal
Vignette du fichier
6469-CacheTimingAttackSEAL.pdf (646.75 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03780506 , version 1 (19-09-2022)

Identifiants

  • HAL Id : hal-03780506 , version 1

Citer

Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Fan Huang, Amina Bel Korchi, et al.. Cache-Timing Attack on the SEAL Homomorphic Encryption Library. 11th International Workshop on Security Proofs for Embedded Systems (PROOFS 2022), Sep 2022, Leuven, Belgium. ⟨hal-03780506⟩
259 Consultations
366 Téléchargements

Partager

Gmail Facebook X LinkedIn More