2022
DOI: 10.1109/tifs.2022.3198277
|View full text |Cite
|
Sign up to set email alerts
|

Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem

Abstract: The NIST standardization process for post-quantum cryptography has been drawing the attention of researchers to the submitted candidates. One direction of research consists in implementing those candidates on embedded systems and that exposes them to physical attacks in return. The Classic McEliece cryptosystem, which is among the four finalists of round 3 in the Key Encapsulation Mechanism category, builds its security on the hardness of the syndrome decoding problem, which is a classic hard problem in code-b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(21 citation statements)
references
References 42 publications
0
21
0
Order By: Relevance
“…To perform classification of the HW classes, we have decided to Random Forest, the reason being is that it has been shown to be successful in the previous works [CDCG22] and it does not have to deal with a more complex hyperparameter tuning usually encountered in more complex models. Random Forest or RF [Bre01] is an ensemble learning algorithm, based on the construction of multiple decision trees.…”
Section: Profiling Phasementioning
confidence: 99%
“…To perform classification of the HW classes, we have decided to Random Forest, the reason being is that it has been shown to be successful in the previous works [CDCG22] and it does not have to deal with a more complex hyperparameter tuning usually encountered in more complex models. Random Forest or RF [Bre01] is an ensemble learning algorithm, based on the construction of multiple decision trees.…”
Section: Profiling Phasementioning
confidence: 99%
“…such that Sz T = z * . To get z * in N n−k , we will use the same method of the power analysis attack in [10]. This method is based on side-channel analysis using random forests to recover z * from the Hamming weight information obtained from the matrix-vector product in the first step of Niederreiter decryption.…”
Section: Contributionmentioning
confidence: 99%
“…) correctly, we can directly find the secret of the cryptosystem. We obtain directly the secret without solving the syndrome decoding problem unlike in [9,10] and this is applicable for most of the code-based cryptosystems.…”
Section: Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…Common countermeasure fail against our attack We recall that our attack on the loading function of the Goppa polynomial coefficients is performed on the optimized reference implementation of Classic McEliece on ARM-Cortex M4 [CC21]. This reference implementation represents the side-channel attack target of several recent papers [Cay+21;Col+22b;GJJ22]. Shuffling is nowadays one of the most common and effective countermeasure techniques against most side-channel attacks [CMJ22].…”
mentioning
confidence: 99%