TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publications
  4. Masking Kyber: first-and higher-order implementations
 
Options

Masking Kyber: first-and higher-order implementations

Citation Link: https://doi.org/10.15480/882.3915
Publikationstyp
Journal Article
Date Issued
2021-08-11
Sprache
English
Author(s)
Bos, Joppe Willem  
Gourjon, Marc Olivier  
Renes, Joost  
Schneider, Tobias  
Vredendaal, Christine van  
Institut
Sicherheit in verteilten Anwendungen E-15-H  
TORE-DOI
10.15480/882.3915
TORE-URI
http://hdl.handle.net/11420/10973
Journal
IACR transactions on cryptographic hardware and embedded systems  
Volume
2021
Issue
4
Start Page
173
End Page
214
Citation
IACR Transactions on Cryptographic Hardware and Embedded Systems (4): 173-214 (2021-08-11)
Publisher DOI
10.46586/tches.v2021.i4.173-214
Scopus ID
2-s2.0-85118419813
Publisher
Ruhr-Universität Bochum
In the final phase of the post-quantum cryptography standardization effort, the focus has been extended to include the side-channel resistance of the candidates. While some schemes have been already extensively analyzed in this regard, there is no such study yet of the finalist Kyber. In this work, we demonstrate the first completely masked implementation of Kyber which is protected against first-and higher-order attacks. To the best of our knowledge, this results in the first higher-order masked implementation of any post-quantum secure key encapsulation mechanism algorithm. This is realized by introducing two new techniques. First, we propose a higher-order algorithm for the one-bit compression operation. This is based on a masked bit-sliced binary-search that can be applied to prime moduli. Second, we propose a technique which enables one to compare uncompressed masked polynomials with compressed public polynomials. This avoids the costly masking of the ciphertext compression while being able to be instantiated at arbitrary orders. We show performance results for first-, second-and third-order protected implementations on the Arm Cortex-M0+ and Cortex-M4F. Notably, our implementation of first-order masked Kyber decapsulation requires 3.1 million cycles on the Cortex-M4F. This is a factor 3.5 overhead compared to the unprotected optimized implementation in pqm4. We experimentally show that the first-order implementation of our new modules on the Cortex-M0+ is hardened against attacks using 100 000 traces and mechanically verify the security in a fine-grained leakage model using the verification tool scVerif.
Subjects
Kyber
Masking
Post-Quantum Cryptography
DDC Class
530: Physik
600: Technik
Publication version
publishedVersion
Lizenz
https://creativecommons.org/licenses/by/4.0/
Loading...
Thumbnail Image
Name

TCHES2021_4_07.pdf

Size

1.22 MB

Format

Adobe PDF

TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback