2021 58th ACM/IEEE Design Automation Conference (DAC) 2021
DOI: 10.1109/dac18074.2021.9586131
|View full text |Cite
|
Sign up to set email alerts
|

FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(22 citation statements)
references
References 17 publications
0
19
0
Order By: Relevance
“…FALCON was side channel attacked by measuring electromagnetic radiation created by the FFT inside the sampler which uses the floating point unit. Such that the attacker could reconstruct the private key after only 10k measurements [19]. Therefor another fork af falcon, zalcon was introduced which ditches the FPA (also good for other iot devices) and uses NTT instead of FTT [20].…”
Section: Falcon and Dilithiummentioning
confidence: 99%
See 1 more Smart Citation
“…FALCON was side channel attacked by measuring electromagnetic radiation created by the FFT inside the sampler which uses the floating point unit. Such that the attacker could reconstruct the private key after only 10k measurements [19]. Therefor another fork af falcon, zalcon was introduced which ditches the FPA (also good for other iot devices) and uses NTT instead of FTT [20].…”
Section: Falcon and Dilithiummentioning
confidence: 99%
“…However this NTT seems to be even more vulnerable to this attack. [19] A fix for this vulnerability though could be to introduce a masking s.t. power consumption etc.…”
Section: Falcon and Dilithiummentioning
confidence: 99%
“…However, DLP does so at the cost of a slow signing algorithm, whereas FALCON, while fast, suffers from a very complex signing algorithm that is hard to implement, poorly suited for parallelization and difficult to protect against side-channel attacks. On the last point, both schemes have been shown to suffer from potential vulnerabilities with respect to side-channel leakage [18,27], and even though the most recent implementation of FALCON appears to be protected against timing attacks [40,24], countermeasures against stronger side-channel attacks like DPA seem difficult to achieve. FALCON is also limited to NTRU lattices over power-of-two cyclotomic fields, which limits its flexibility in terms of parameter selection.…”
Section: Introductionmentioning
confidence: 99%
“…While the Gaussian sampling algorithms used in Falcon were subject to timing attacks [BHLY16, EFGT17, PBY17, FKT + 20] and countermeasures were designed [HPRR20] accordingly, concrete power attacks threatening Falcon implementations have only been performed in [KA21]. Moreover, this attack targets a subroutine of the algorithm and focuses on the recovery of values encoded in floating points.…”
Section: Introductionmentioning
confidence: 99%