CryptoDB
Shiduo Zhang
Publications
Year
Venue
Title
2025
EUROCRYPT
Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences
Abstract
Falcon is one of the three postquantum signature schemes already selected by NIST for
standardization. It is the most compact among them, and offers excellent
efficiency and security. However, it is based on a complex algorithm for
lattice discrete Gaussian sampling which presents a number of
implementation challenges. In particular, it relies on (possibly emulated)
floating-point arithmetic, which is often regarded as a cause for concern, and
has been leveraged in, e.g., side-channel analysis. The extent to which
Falcon's use of floating point arithmetic can cause security issues has yet
to be thoroughly explored in the literature.
In this paper, we contribute to filling this gap by identifying a way in which
Falcon's lattice discrete Gaussian sampler, due to specific design
choices, is singularly sensitive to floating-point errors. In the presence
of small floating-point discrepancies (which can occur in various ways,
including the use of the two almost but not quite equivalent
signing procedures ``dynamic'' and ``tree'' exposed by the Falcon API),
we find that, when called twice on the same input, the Falcon sampler
has a small but significant chance (on the order of once in a few thousand
calls) of outputting two different lattice points with a very structured
difference, that immediately reveals the secret key. This is in contrast to
other lattice Gaussian sampling algorithms like Peikert's sampler and Prest's
hybrid sampler, that are stable with respect to small floating-point errors.
Correctly generated Falcon signatures include a salt that should in
principle prevent the sampler to ever be called on the same input twice.
In that sense, our observation has little impact on the security of
Falcon signatures per se (beyond echoing warnings about the dangers of
repeated randomness). On the other hand, it is critical for
derandomized variants of Falcon, which have been proposed for use
in numerous settings. One can mention in particular identity-based
encryption, SNARK-friendly signatures, and sublinear signature
aggregation. For all these settings, small floating point discrepancies
have a chance of resulting in full private key exposure, even when using
the slower, integer-based emulated floating-point arithmetic of Falcon's
reference implementation.
2025
PKC
Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure
Abstract
Falcon is one of post-quantum signature schemes selected by NIST for standardization. With the deployment underway, its implementation security is of great importance. In this work, we focus on the side-channel security of Falcon and our contributions are threefold.
First, by exploiting the symplecticity of NTRU and a recent decoding technique, we dramatically improve the key recovery using power leakages within Falcon Gaussian samplers. Compared to the state of the art (Zhang, Lin, Yu and Wang, EUROCRYPT 2023), the amount of traces required by our attack for a full key recovery is reduced by at least 85%.
Secondly, we present a complete power analysis for two exposed power leakages within Falcon’s integer Gaussian sampler. We identify new sources of these leakages, which have not been identified by previous works, and conduct detailed security evaluations within the reference implementation of Falcon on Chipwhisperer.
Thirdly, we propose effective and easy-to-implement countermeasures against both two leakages to protect the whole Falcon’s integer Gaussian sampler. Configured with our countermeasures, we provide security evaluations on Chipwhisperer and report performance of protected implementation. Experimental results highlight that our countermeasures admit a practical trade-off between effciency and side-channel security.
2024
PKC
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme
Abstract
The Peregrine signature scheme is one of the candidates in the ongoing Korean post-quantum cryptography competition. It is proposed as a high-speed variant of Falcon, which is a hash-and-sign signature scheme over NTRU lattices and one of the schemes selected by NIST for standardization. To this end, Peregrine replaces the lattice Gaussian sampler in the Falcon signing procedure with a new sampler based on the centered binomial distribution. While this modification offers significant advantages in terms of efficiency and implementation, it does not come with a provable guarantee that signatures do not leak information about the signing key. Unfortunately, lattice based signature schemes in the hash-and-sign paradigm that lack such a guarantee (such as GGH, NTRUSign or DRS) have generally proved insecure.
In this paper, we show that Peregrine is no exception, by demonstrating a practical key recovery attack against it. We observe that the distribution of Peregrine signatures is a hidden transformation of some public distribution and still leaks information about the signing key. By adapting the parallelepiped-learning technique of Nguyen and Regev (Eurocrypt 2006), we show that the signing key can be recovered from a relatively small number of signatures. The learning technique alone yields an approximate version of the key, from which we can recover the exact key using a decoding technique due to Thomas Prest (PKC 2023).
For the reference implementation (resp. the official specification version) of Peregrine-512, we fully recover the secret key with good probability in a few hours given around 25,000 (resp. 11 million) signature samples.
2023
EUROCRYPT
Improved Power Analysis Attacks on Falcon
Abstract
Falcon is one of the three post-quantum signature schemes selected for standardization by NIST. Due to its low bandwidth and high efficiency, Falcon is seen as an attractive option for quantum-safe embedded systems. In this work, we study Falcon’s side-channel resistance by analysing its Gaussian samplers. Our results are mainly twofold.
The first result is an improved key recovery exploiting the leakage within the base sampler investigated by Guerreau et al. (CHES 2022). Instead of resorting to the fourth moment as in former parallelepiped-learning attacks, we work with the second order statistics covariance and use its spectral decomposition to recover the secret information. Our approach substantially reduces the the requirement of measurements and computation resources: 220 000 traces is sufficient to recover the secret key of Falcon-512 within half an hour with a probability of ≈ 25%. As a comparison, even with 106 traces, the former attack still needs about 1000 hours CPU time of lattice reduction for a full key recovery. In addition, our approach is robust to inaccurate leakage classification, which is another advantage over parallelepiped-learning attacks.
Our second result is a practical power analysis targeting the integer Gaussian sampler of Falcon. The analysis relies on the leakage of random sign flip within the integer Gaussian sampling. This leakage was exposed in 2018 by Kim and Hong, but it is not considered in the Falcon’s implementation and unexploited for side-channel analysis until now. We identify the leakage within the reference implementation of Falcon on an ARM Cortex-M4 STM32F407IGT6 microprocessor. We also show that this single bit of leakage is in effect enough for practical key recovery: with 170 000 traces one can fully recover the key of Falcon-512 within half an hour. Furthermore, combining the sign leakage and the aforementioned leakage, one can recover the key with only 45 000 signature measurements in a short time.
As a by-product, we also extend our power analysis to Mitaka that is a recent variant of Falcon. The same leakages exist within the integer Gaussian samplers of Mitaka, and they can also be used to mount key recovery attacks. Nevertheless, the key recovery in Mitaka requires much more traces than it does in Falcon, due to their different lattice Gaussian samplers.
2022
PKC
Towards a Simpler Lattice Gadget Toolkit
📺
Abstract
As a building block, gadgets and associated algorithms are widely used in advanced lattice cryptosystems. The gadget algorithms for power-of-base moduli are very efficient and simple, however the current algorithms for arbitrary moduli are still complicated and practically more costly despite several efforts. Considering the necessity of arbitrary moduli, developing simpler and more practical gadget algorithms for arbitrary moduli is crucial to improving the practical performance of lattice based applications.
In this work, we propose two new gadget sampling algorithms for arbitrary moduli. Our first algorithm is for gadget Gaussian sampling. It is simple and efficient. One distinguishing feature of our Gaussian sampler is that it does not need floating-point arithmetic, which makes it better compatible with constrained environments. Our second algorithm is for gadget subgaussian sampling. Compared with the existing algorithm, it is simpler, faster, and requires asymptotically less randomness. In addition, our subgaussian sampler achieves an almost equal quality for different practical parameters. Overall these two algorithms provide simpler options for gadget algorithms and enhance the practicality of the gadget toolkit.
Coauthors
- Masayuki Abe (1)
- Thomas Espitau (1)
- Xiuhan Lin (4)
- Mehdi Tibouchi (2)
- Weijia Wang (2)
- Xiaoyun Wang (1)
- Ximing Xu (1)
- Qidi You (1)
- Yang Yu (5)
- Moeto Suzuki (1)
- Shiduo Zhang (5)