2018
DOI: 10.46586/tches.v2018.i3.500-523
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations

Abstract: In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature schemes based on multivariate quadratic equations, which is one of the most promising alternatives for post-quantum signature schemes, against side-channel attacks. We describe correlation power analysis (CPA) on the schemes that yield full secret key recoveries. First, we identify a secret leakage of secret affine maps S and T during matrix-vector products in signing when Rainbow is implemented with equivalent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 13 publications
(21 reference statements)
0
15
0
Order By: Relevance
“…Indeed, in recent years, numerous side-channel attacks e.g. [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29] and fault attacks e.g. [30], [31], [32], [33], [34], [35], [36], [37], [5], [38] have been demonstrated by the research community on PQC schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, in recent years, numerous side-channel attacks e.g. [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29] and fault attacks e.g. [30], [31], [32], [33], [34], [35], [36], [37], [5], [38] have been demonstrated by the research community on PQC schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Since then multiple side channels have been demonstrated, exploiting various effects, such as timing [1,11,14,15], power consumption [34], electromagnetic (EM) emanations [17,27,44], shared microarchitectural components [29,50], and even acoustic and photonic emanations [4,30,35,47]. These side channels pose a severe risk to the security of systems, and in particular to cryptographic implementations, and effective side channel attacks have been demonstrated against block and stream ciphers [31,45], public key systems, both traditional [22,41] and post quantum [43], cryptographic primitives implemented in real-world devices [5,24], and even non-cryptographic algorithms [8].…”
Section: Introductionmentioning
confidence: 99%
“…Yi and Li [37] proposed a fault attack and DPA on ASIC implementation of enTTS scheme in 2017. In 2018, Park et al [38] presented a correlation power analysis attack against the Rainbow and UOV schemes on an 8-bit AVR microcontroller that yields full secret key recoveries. In 2019, based on the work of Hashimoto et al, Krämer and Loiero [39] complemented the research on fault attacks of multivariate signature schemes.…”
Section: Introductionmentioning
confidence: 99%