About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Research Article

Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-25538-0_33,
        author={Mengyao Shi and Zhu Wang and Tingting Peng and Fenghua Li},
        title={Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation},
        proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
        proceedings_a={SECURECOMM},
        year={2023},
        month={2},
        keywords={Lattice-based cryptography Side-channel attacks Message decoding Kyber},
        doi={10.1007/978-3-031-25538-0_33}
    }
    
  • Mengyao Shi
    Zhu Wang
    Tingting Peng
    Fenghua Li
    Year: 2023
    Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-25538-0_33
Mengyao Shi1, Zhu Wang1,*, Tingting Peng1, Fenghua Li1
  • 1: Institute of Information Engineering, Chinese Academy of Sciences
*Contact email: wangzhu@iie.ac.cn

Abstract

In this work, we propose practical side-channel attacks for message recovery in post-quantum key encapsulation mechanisms (KEM). As a target scheme, Kyber is a standardized algorithm in the ongoing NIST standardization process. Notably, this work is the first one that implements message recovery by exploiting the information leaked on computational operations during Kyber decoding. The main findings include 1. analyzing computational operations during decoding by power consumption information to effectively recover message; 2. recovering message by analyzing the time differences existing in decoding single bits; 3. by way of simple power analysis, using incremental storage leakage to recover the message.

Keywords
Lattice-based cryptography Side-channel attacks Message decoding Kyber
Published
2023-02-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-25538-0_33
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL