Ciphertext Malleability in Lattice-Based KEMs as a Countermeasure to Side Channel Analysis

📅 2024-09-24
🏛️ arXiv.org
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Quantum computing threatens classical asymmetric cryptography, accelerating post-quantum cryptography (PQC) adoption; however, lattice-based key encapsulation mechanisms (KEMs)—a leading PQC class—exhibit ciphertext malleability, rendering them vulnerable to side-channel attacks (SCAs), as demonstrated by Ravi et al. Method: This work pioneers a paradigm shift: repurposing ciphertext malleability from a security flaw into an active SCA defense mechanism. We propose a ciphertext-transformation framework for SCA mitigation and systematically extend the Ravi attack model to cover FrodoKEM’s full security level. Our approach integrates side-channel modeling, lattice cryptanalysis, and KEM implementation hardening. Results: Evaluated on FrodoKEM and other mainstream lattice-based KEMs, our method significantly suppresses timing and power leakage, reduces key-recovery success rates substantially, and incurs negligible computational overhead—thereby enhancing the physical-layer robustness of PQC implementations without compromising security or efficiency.

Technology Category

Application Category

📝 Abstract
Due to developments in quantum computing, classical asymmetric cryptography is at risk of being breached. Consequently, new Post-Quantum Cryptography (PQC) primitives using lattices are studied. Another point of scrutiny is the resilience of these new primitives to Side Channel Analysis (SCA), where an attacker can study physical leakages. In this work we discuss a SCA vulnerability due to the ciphertext malleability of some PQC primitives exposed by a work from Ravi et al. We propose a novel countermeasure to this vulnerability exploiting the same ciphertext malleability and discuss its practical application to several PQC primitives. We also extend the seminal work of Ravi et al. by detailling their attack on the different security levels of a post-quantum Key Encapsulation Mechanism (KEM), namely FrodoKEM.
Problem

Research questions and friction points this paper is trying to address.

Addresses ciphertext malleability in lattice-based KEMs
Proposes countermeasure to SCA vulnerability in PQC
Extends attack analysis on FrodoKEM security levels
Innovation

Methods, ideas, or system contributions that make the work stand out.

Exploits ciphertext malleability for SCA countermeasure
Extends Ravi et al. attack on FrodoKEM levels
Generalizes attack parameters for future primitives
🔎 Similar Papers
No similar papers found.
P
Pierre-Augustin Berthet
Hensoldt France SAS, Plaisir, France; LTCI, Télécom Paris, Palaiseau, France