International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP

Authors:
Vincent Quentin Ulitzsch , Technical University Berlin, Berlin, Germany
Soundes Marzougui , Technical University Berlin, Berlin, Germany; STMicroelectronics, Diegem, Belgium
Alexis Bagia , Technical University Berlin, Berlin, Germany
Mehdi Tibouchi , NTT Social Informatics Laboratories, Tokyo, Japan
Jean-Pierre Seifert , Technical University Berlin, Berlin, Germany; Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany
Download:
DOI: 10.46586/tches.v2023.i4.367-392
URL: https://tches.iacr.org/index.php/TCHES/article/view/11170
Search ePrint
Search Google
Abstract: At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature schemes following the Fiat–Shamir with aborts paradigm. Their attack recovered the signing key by injecting faults in the sampling of the commitment vector (also called masking vector) y, leaving its coefficients at their initial zero value. As possible countermeasures, they proposed to carry out the sampling of the coefficients of y in shuffled order, or to ensure that the masking polynomials in y are not of low degree. In this paper, we show that both of these countermeasures are insufficient. We demonstrate a new loop-abort fault injection attack against Fiat–Shamir with aborts lattice-based signatures that can recover the secret key from faulty signatures even when the proposed countermeasures are implemented. The key idea of our attack is that faulted signatures give rise to a noisy linear system of equations, which can be solved using integer linear programming. We present an integer linear program that recovers the secret key efficiently in practice, and validate the efficacy of our attack by conducting a practical end-to-end attack against a shuffled version of the Dilithium reference implementation, mounted on an ARM Cortex M4. We achieve a full (equivalent) key recovery in under 3 minutes total execution time (including signature generation), using only 5 faulted signatures. In addition, we conduct extensive theoretical simulations of the attack against Dilithium. We find that our method can achieve key recovery in under 5 minutes given a (sufficiently large) set of signatures where just one of the coefficients of y is zeroed out (or left at its initial value of zero). Furthermore, we find that our attack works against all security levels of Dilithium. Our attack shows that protecting Fiat–Shamir with aborts lattice-based signatures against fault injection attacks cannot be achieved using the simple countermeasures proposed by Espitau et al. and likely requires significantly more expensive countermeasures.
BibTeX
@article{tches-2023-33352,
  title={Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  publisher={Ruhr-Universität Bochum},
  volume={2023, Issue 4},
  pages={367-392},
  url={https://tches.iacr.org/index.php/TCHES/article/view/11170},
  doi={10.46586/tches.v2023.i4.367-392},
  author={Vincent Quentin Ulitzsch and Soundes Marzougui and Alexis Bagia and Mehdi Tibouchi and Jean-Pierre Seifert},
  year=2023
}