CryptoDB
How We Broke a Fifth-Order Masked Kyber Implementation by Copy-Paste
| Authors: | |
|---|---|
| Download: | |
| Presentation: | Slides |
| Abstract: | CRYSTALS-Kyber has been recently selected by the NIST as a post-quantum public-key encryption and key-establishment algorithm to be standardized. This makes it important to assess how well CRYSTALS-Kyber implementations withstand side-channel attacks. The first-order masked implementations of CRYSTALS-Kyber have been already analyzed. In this talk, we will present a side-channel attack on a higher-order masked implementation of CRYSTALS-Kyber. We will show how to recover messages from up to the fifth-order masked implementations of CRYSTALS-Kyber in ARM Cortex-M4 CPU by a deep learning-based power analysis. The talk is expected to be of interest to industry which is currently preparing for a shift to quantum-resistant cryptographic algorithms. |
| Video: | https://youtu.be/rf63D1fdOJM?t=3 |
BibTeX
@misc{rwc-2023-35434,
title={How We Broke a Fifth-Order Masked Kyber Implementation by Copy-Paste},
note={Video at \url{https://youtu.be/rf63D1fdOJM?t=3}},
howpublished={Talk given at RWC 2023},
author={Elena Dubrova and Kalle Ngo and Joel Gärtner},
year=2023
}