Single Trace Side Channel Analysis on NTRU Implementation

As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against the quantum adversary. Although NTRU has withstood various algebraic attacks, its side-channel resistance must also be considered for secure implementation. In this paper, we proposed the first single trace attack on NTRU. Previous side-channel attacks on NTRU used numerous power traces, which increase the attack complexity and limit the target algorithm. There are two versions of NTRU implementation published in succession. We demonstrated our attack on both implementations using a single power consumption trace obtained in the decryption phase. Furthermore, we propose a countermeasure to prevent the proposed attacks. Our countermeasure does not degrade in terms of performance.

[1]  Oldrich Zmeskal,et al.  Entropy of fractal systems , 2013, Comput. Math. Appl..

[2]  Gorka Irazoqui Apecechea,et al.  Cache Attacks Enable Bulk Key Recovery on the Cloud , 2016, CHES.

[3]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[4]  William Whyte,et al.  Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls , 2007, CT-RSA.

[5]  Dooho Choi,et al.  Power analysis attacks against NTRU and their countermeasures , 2009, INSCRYPT 2009.

[6]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[7]  Amar Seeam,et al.  Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies , 2018, Electronics.

[8]  Zdenek Martinasek,et al.  Simple Electromagnetic Analysis in Cryptography , 2012 .

[9]  Emanuel Guariglia,et al.  Spectral analysis of the Weierstrass-Mandelbrot function , 2017, 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech).

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[12]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[13]  Emanuel Guariglia,et al.  Entropy and Fractal Antennas , 2016, Entropy.

[14]  Yuval Yarom,et al.  FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.

[15]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[16]  Joseph H. Silverman,et al.  Optimizations for NTRU , 2001 .

[17]  Damián H. Zanette Generalized Kolmogorov entropy in the dynamics of multifractal generation , 1996 .

[18]  M. Berry,et al.  On the Weierstrass-Mandelbrot fractal function , 1980, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[19]  Daniel Smith-Tone,et al.  Report on Post-Quantum Cryptography , 2016 .

[20]  Dooho Choi,et al.  Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF system* , 2014, Inscrypt 2014.

[21]  An Wang,et al.  First-order collision attack on protected NTRU cryptosystem , 2013, Microprocess. Microsystems.

[22]  Jie Lin,et al.  Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things , 2017 .

[23]  Emanuel Guariglia,et al.  Harmonic Sierpinski Gasket and Applications , 2018, Entropy.

[24]  Xiaojin Zhao,et al.  A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks , 2018, Sensors.

[25]  Jean-Sébastien Coron,et al.  On Boolean and Arithmetic Masking against Differential Power Analysis , 2000, CHES.

[26]  Dooho Choi,et al.  Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[27]  William Whyte,et al.  NAEP: Provable Security in the Presence of Decryption Failures , 2003, IACR Cryptol. ePrint Arch..

[28]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.