International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip

Authors:
Calvin Abou Haidar , NTT Social Informatics Laboratories
Quentin Payet , Centrale-Supelec
Mehdi Tibouchi , NTT Social Informatics Laboratories
Download:
Search ePrint
Search Google
Conference: CRYPTO 2025
Abstract: The Rowhammer attack is a fault-injection technique lever aging the density of RAM modules to trigger persistent hardware bit flips that can be used for probing or modifying protected data. In this paper, we show that Falcon, the hash-and-sign signature scheme over NTRU lattices selected by NIST for standardization, is vulnerable to an attack using Rowhammer. Falcon’s Gaussian sampler is the core component of its security, as it allows to provably decorrelate the short basis used for signing and the generated signatures. Other schemes, lacking this guarantee (such as NTRUSign, GGH or more recently Peregrine) were proven insecure. However, performing efficient and secure lattice Gaussian sampling has proved to be a difficult task, fraught with numerous potential vulnerabilities to be exploited. To avoid timing attacks, a common technique is to use distribution tables that are traversed to output a sample. The official Falcon implementation uses this technique, employing a hardcoded reverse cumulative distribution table (RCDT). Using Rowhammer, we target Falcon’s RCDT to trigger a very small number of targeted bit flips, and prove that the resulting distribution is sufficiently skewed to perform a key recovery attack. Namely, we show that a single targeted bit flip suffices to fully recover the signing key, given a few hundred million signatures, with more bit flips enabling key recovery with fewer signatures. Interestingly, the Nguyen-Regev parallelepiped learning attack that broke NTRUSign, GGH and Peregrine does not readily adapt to this setting unless the number of bit flips is very large. However, we show that combining it with principal component analysis (PCA) yields a practical attack. Variants combining PCA with non-convex optimization or lattice reduction are also consid- ered. This vulnerability can also be triggered with other types of persistent fault attacks on memory like optical faults. We suggest cheap countermeasures that largely mitigate it, including rejecting signatures that are unusually short.
BibTeX
@inproceedings{crypto-2025-35749,
  title={Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip},
  publisher={Springer-Verlag},
  author={Calvin Abou Haidar and Quentin Payet and Mehdi Tibouchi},
  year=2025
}