Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Suhri-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-09-02T05:27:52Z-
dc.date.available2021-09-02T05:27:52Z-
dc.date.created2021-06-19-
dc.date.issued2018-10-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/72608-
dc.description.abstractThe Gaussian sampler is an integral part in lattice-based cryptography as it has a direct connection to security and efficiency. Although it is theoretically secure to use the Gaussian sampler, the security of its implementation is an open issue. Therefore, researchers have started to investigate the security of the Gaussian sampler against side-channel attacks. Since the performance of the Gaussian sampler directly affects the performance of the overall cryptosystem, countermeasures considering only timing attacks are applied in the literature. In this paper, we propose the first single trace power analysis attack on a constant-time cumulative distribution table (CDT) sampler used in lattice-based cryptosystems. From our analysis, we were able to recover every sampled value in the key generation stage, so that the secret key is recovered by the Gaussian elimination. By applying our attack to the candidates submitted to the National Institute of Standards and Technology (NIST), we were able to recover over 99% of the secret keys. Additionally, we propose a countermeasure based on a look-up table. To validate the efficiency of our countermeasure, we implemented it in Lizard and measure its performance. We demonstrated that the proposed countermeasure does not degrade the performance.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.subjectLATTICES-
dc.subjectATTACK-
dc.titleSingle Trace Analysis on Constant Time CDT Sampler and Its Countermeasure-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.3390/app8101809-
dc.identifier.scopusid2-s2.0-85054375619-
dc.identifier.wosid000448653700104-
dc.identifier.bibliographicCitationAPPLIED SCIENCES-BASEL, v.8, no.10-
dc.relation.isPartOfAPPLIED SCIENCES-BASEL-
dc.citation.titleAPPLIED SCIENCES-BASEL-
dc.citation.volume8-
dc.citation.number10-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordPlusLATTICES-
dc.subject.keywordPlusATTACK-
dc.subject.keywordAuthorpost-quantum cryptography-
dc.subject.keywordAuthorlattice-based cryptography-
dc.subject.keywordAuthorGaussian sampling-
dc.subject.keywordAuthorCDT sampling-
dc.subject.keywordAuthorside-channel attack-
dc.subject.keywordAuthorsingle trace analysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE