Vulnerable PQC against Side Channel Analysis - A Case Study on Kyber

Haocheng Ma,Shijian Pan,Ya Gao,Jiaji He,Yiqiang Zhao,Yier Jin
DOI: https://doi.org/10.1109/ASIANHOST56390.2022.10022165
2022-01-01
Abstract:The emergence of quantum computing and its impact on current cryptographic algorithms has triggered the migration to post-quantum cryptography (PQC). Among the PQC candidates, CRYSTALS-Kyber is a key encapsulation mechanism (KEM) that stands out from the National Institute of Standards and Technology (NIST) standardization project. While software implementations of Kyber have been developed and evaluated recently, Kyber's hardware implementations, especially designs with parallel architecture, are rarely discussed. To help better understand Kyber hardware designs and their security against side-channel analysis (SCA) attacks, in this paper, we first adapt the two most recent Kyber hardware designs for FPGA implementations. We then perform SCA attacks against these hardware designs with different architectures, i.e., parallelization and pipelining. Our experimental results show that Kyber designs on FPGA boards are vulnerable to SCA attacks including electromagnetic (EM) and power side channels. An attacker only needs 27 similar to 1600 power traces or 60 similar to 2680 EM traces to recover the decryption key successfully.
What problem does this paper attempt to address?