
Research Article
Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
@INPROCEEDINGS{10.1007/978-3-031-25538-0_33, author={Mengyao Shi and Zhu Wang and Tingting Peng and Fenghua Li}, title={Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation}, proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, proceedings_a={SECURECOMM}, year={2023}, month={2}, keywords={Lattice-based cryptography Side-channel attacks Message decoding Kyber}, doi={10.1007/978-3-031-25538-0_33} }
- Mengyao Shi
Zhu Wang
Tingting Peng
Fenghua Li
Year: 2023
Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
SECURECOMM
Springer
DOI: 10.1007/978-3-031-25538-0_33
Abstract
In this work, we propose practical side-channel attacks for message recovery in post-quantum key encapsulation mechanisms (KEM). As a target scheme, Kyber is a standardized algorithm in the ongoing NIST standardization process. Notably, this work is the first one that implements message recovery by exploiting the information leaked on computational operations during Kyber decoding. The main findings include 1. analyzing computational operations during decoding by power consumption information to effectively recover message; 2. recovering message by analyzing the time differences existing in decoding single bits; 3. by way of simple power analysis, using incremental storage leakage to recover the message.
Copyright © 2022–2025 ICST