Physical attacks are serious threats to cryptosystems deployed in the real world. In this work, we propose a microarchitectural end-to-end attack methodology on generic lattice-based post-quantum key encapsulation mechanisms to recover the long-term secret key. Our attack targets a critical component of a Fujisaki-Okamoto transform that is used in the construction of almost all lattice-based key encapsulation mechanisms. We demonstrate our attack model on practical schemes such as Kyber and Saber by using Rowhammer. We show that our attack is highly practical and imposes little preconditions on the attacker to succeed. As an additional contribution, we propose an improved version of the plaintext checking oracle, which is used by almost all...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
With the NIST Post quantum cryptography competition in final round, the importance of implementation...
We present a key-recovery fault injection attack on the Classic McEliece Key Encapsulation Mechanism...
CRYSTALS-Kyber is a key-encapsulation mechanism, whose security is based on the hardness of solving ...
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the ...
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic prop...
In this work, we recover the private key material of the FrodoKEM key exchange mechanism as submitte...
In this paper, we propose EM side-channel attacks with carefully constructed ciphertext on Kyber, a ...
This repository contains data to reproduce results from the paper "Magnifying Side-Channel Leakage o...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
Last year CRYSTALS-Kyber was chosen by NIST as a new, post-quantum secure key encapsulation mechanis...
As the message recovery-based attack poses a serious threat to lattice-based schemes, we conducted a...
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with errors (LWE...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
With the NIST Post quantum cryptography competition in final round, the importance of implementation...
We present a key-recovery fault injection attack on the Classic McEliece Key Encapsulation Mechanism...
CRYSTALS-Kyber is a key-encapsulation mechanism, whose security is based on the hardness of solving ...
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the ...
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic prop...
In this work, we recover the private key material of the FrodoKEM key exchange mechanism as submitte...
In this paper, we propose EM side-channel attacks with carefully constructed ciphertext on Kyber, a ...
This repository contains data to reproduce results from the paper "Magnifying Side-Channel Leakage o...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
Last year CRYSTALS-Kyber was chosen by NIST as a new, post-quantum secure key encapsulation mechanis...
As the message recovery-based attack poses a serious threat to lattice-based schemes, we conducted a...
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with errors (LWE...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
With the NIST Post quantum cryptography competition in final round, the importance of implementation...
We present a key-recovery fault injection attack on the Classic McEliece Key Encapsulation Mechanism...