SIKE Channels
Zero-Value Side-Channel Attacks on SIKE
DOI:
https://doi.org/10.46586/tches.v2022.i3.264-289Keywords:
SIKE, side-channel attack, zero-value attack, countermeasures, post-quantum cryptography, isogeny-based cryptographyAbstract
We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure. We show that coordinate randomization alone is not sufficient, because SIKE is vulnerable to a class of attacks similar to refined power analysis in elliptic curve cryptography, named zero-value attacks. We describe and confirm in the lab two such attacks leading to full key recovery, and analyze their countermeasures.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerovi´c, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
This work is licensed under a Creative Commons Attribution 4.0 International License.