SIKE Channels: Zero-Value Side-Channel Attacks on SIKE - CEA - Commissariat à l’énergie atomique et aux énergies alternatives Accéder directement au contenu
Article Dans Une Revue IACR Transactions on Cryptographic Hardware and Embedded Systems Année : 2022

SIKE Channels: Zero-Value Side-Channel Attacks on SIKE

Luca de Feo
  • Fonction : Auteur
Nadia El Mrabet
  • Fonction : Auteur
Aymeric Genêt
  • Fonction : Auteur
Novak Kaluđerović
  • Fonction : Auteur
Natacha Linard de Guertechin
  • Fonction : Auteur

Résumé

We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure. We show that coordinate randomization alone is not sufficient, because SIKE is vulnerable to a class of attacks similar to refined power analysis in elliptic curve cryptography, named zero-value attacks. We describe and confirm in the lab two such attacks leading to full key recovery, and analyze their countermeasures.

Dates et versions

cea-04072864 , version 1 (18-04-2023)

Identifiants

Citer

Luca de Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerović, Natacha Linard de Guertechin, et al.. SIKE Channels: Zero-Value Side-Channel Attacks on SIKE. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, Volume 2022, Issue 3, pp.264-289. ⟨10.46586/tches.v2022.i3.264-289⟩. ⟨cea-04072864⟩
15 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More