SIKE Channels: Zero-Value Side-Channel Attacks on SIKE - CEA - Commissariat à l’énergie atomique et aux énergies alternatives Access content directly
Journal Articles IACR Transactions on Cryptographic Hardware and Embedded Systems Year : 2022

SIKE Channels: Zero-Value Side-Channel Attacks on SIKE

Luca de Feo
  • Function : Author
Nadia El Mrabet
  • Function : Author
Aymeric Genêt
  • Function : Author
Novak Kaluđerović
  • Function : Author
Natacha Linard de Guertechin
  • Function : Author

Abstract

We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure. We show that coordinate randomization alone is not sufficient, because SIKE is vulnerable to a class of attacks similar to refined power analysis in elliptic curve cryptography, named zero-value attacks. We describe and confirm in the lab two such attacks leading to full key recovery, and analyze their countermeasures.

Dates and versions

cea-04072864 , version 1 (18-04-2023)

Identifiers

Cite

Luca de Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerović, Natacha Linard de Guertechin, et al.. SIKE Channels: Zero-Value Side-Channel Attacks on SIKE. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, Volume 2022, Issue 3, pp.264-289. ⟨10.46586/tches.v2022.i3.264-289⟩. ⟨cea-04072864⟩
9 View
0 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More