CryptoDB
Xiaohan Zhang
Publications and invited talks
    Year
  
  
    Venue
  
  
    Title
  
    2022
  
  
    TCHES
  
  
    Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber
            
      Abstract    
    
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a generic and efficient adaptive approach to improve the sample complexity (i.e., the required number of traces) of plaintext-checking (PC) oracle-based sidechannel attacks (SCAs), a major class of key recovery chosen-ciphertext SCAs on lattice-based key encapsulation mechanisms (KEMs). This new approach is preferable when the constructed PC oracle is imperfect, which is common in practice, and its basic idea is to design new detection codes that can determine erroneous positions in the initially recovered secret key. These secret entries are further corrected with a small number of additional traces. This work benefits from the generality of PC oracle and thus is applicable to various schemes and implementations.Our main target is Kyber since it has been selected by NIST as the KEM algorithm for standardization. We instantiated the proposed generic attack on Kyber512 and then conducted extensive computer simulations against Kyber512 and FireSaber. We further mounted an electromagnetic (EM) attack against an optimized implementation of Kyber512 in the pqm4 library running on an STM32F407G board with an ARM Cortex-M4 microcontroller. These simulations and real-world experiments demonstrate that the newly proposed attack could greatly improve the state-of-the-art in terms of the required number of traces. For instance, the new attack requires only 41% of the EM traces needed in a majority-voting attack in our experiments, where the raw oracle accuracy is fixed.
  
    2021
  
  
    ASIACRYPT
  
  
    A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
 📺            
      Abstract    
    
Research on key mismatch  attacks against lattice-based KEMs is  an important part of the cryptographic  assessment of the ongoing NIST standardization of post-quantum cryptography. There have been a number of these attacks to date. However, a unified method to evaluate  these KEMs' resilience under key mismatch attacks is still missing. Since the key index of efficiency is the number of queries needed to successfully mount  such an attack,  in this paper, we propose and develop a systematic approach to find lower bounds  on the minimum average number of queries  needed for such attacks. Our basic idea is to transform the problem of finding the lower bound of queries into finding an optimal binary recovery tree (BRT), where  the computations of the lower bounds  become essentially the computations  of a certain Shannon entropy. The optimal BRT approach also enables us to understand why, for some lattice-based NIST candidate KEMs, there is a big gap between the theoretical  bounds  and bounds observed in practical attacks,  in terms of the number of queries needed. This further leads us to propose a generic improvement method  for these existing attacks, which are confirmed by our experiments. Moreover, our proposed method could be directly used to improve the side-channel attacks against  CCA-secure NIST candidate KEMs.
  Coauthors
- Chi Cheng (1)
- Chen-Mou Cheng (1)
- Jintai Ding (1)
- Qian Guo (1)
- Lei Hu (1)
- Tao Jiang (1)
- Yanbin Pan (1)
- Yu Qin (1)
- Muyan Shen (1)
- Xiaohan Zhang (2)
