Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography

Authors

  • Bo-Yeon Sim Department of Mathematics, Kookmin University, Seoul
  • Jihoon Kwon Security Research Team, Samsung SDS, Inc., Seoul
  • Kyu Young Choi Security Research Team, Samsung SDS, Inc., Seoul
  • Jihoon Cho Security Research Team, Samsung SDS, Inc., Seoul
  • Aesun Park Department of Financial Information Security, Kookmin University, Seoul
  • Dong-Guk Han Department of Mathematics, Department of Financial Information Security, Kookmin University, Seoul

DOI:

https://doi.org/10.13154/tches.v2019.i4.180-212

Keywords:

Side-Channel Attack, Quasi-Cyclic Code-Based Cryptography, QCMDPC, QC-LDPC, Multiple-Trace Attack, Single-Trace Attack

Abstract

Chou suggested a constant-time implementation for quasi-cyclic moderatedensity parity-check (QC-MDPC) code-based cryptography to mitigate timing attacks at CHES 2016. This countermeasure was later found to become vulnerable to a differential power analysis (DPA) in private syndrome computation, as described by Rossi et al. at CHES 2017. The proposed DPA, however, still could not completely recover accurate secret indices, requiring further solving linear equations to obtain entire secret information. In this paper, we propose a multiple-trace attack which enables to completely recover accurate secret indices. We further propose a singletrace attack which can even work when using ephemeral keys or applying Rossi et al.’s DPA countermeasures. Our experiments show that the BIKE and LEDAcrypt may become vulnerable to our proposed attacks. The experiments are conducted using power consumption traces measured from ChipWhisperer-Lite XMEGA (8-bit processor) and ChipWhisperer UFO STM32F3 (32-bit processor) target boards.

Published

2019-08-09

Issue

Section

Articles

How to Cite

Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography. (2019). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(4), 180-212. https://doi.org/10.13154/tches.v2019.i4.180-212