Systematic Timing Leakage Analysis of NIST PQDSS Candidates: Tooling and Lessons Learned

📅 2025-09-04
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study addresses potential timing side-channel leakage in NIST post-quantum digital signature standardization candidates. We present the first automated toolchain for verifying constant-time (CT) compliance directly on binary code. Methodologically, we integrate TIMECOP with Binsec/Rel2 to perform fine-grained, binary-level CT policy verification, and combine dudect with RTLF for statistical timing behavior analysis. Applying this framework to 14 open-source implementations from NIST’s first and second PQC standardization rounds, we systematically identify 26 timing vulnerabilities—five of which have been confirmed and patched. Our approach significantly improves the accuracy, scalability, and practical applicability of CT analysis. By enabling reproducible, integrable verification, the toolchain supports both secure implementation practices and evidence-based standardization decisions for post-quantum cryptography.

Technology Category

Application Category

📝 Abstract
The PQDSS standardization process requires cryptographic primitives to be free from vulnerabilities, including timing and cache side-channels. Resistance to timing leakage is therefore an essential property, and achieving this typically relies on software implementations that follow constant-time principles. Moreover, ensuring that all implementations are constant-time is crucial for fair performance comparisons, as secure implementations often incur additional overhead. Such analysis also helps identify scheme proposals that are inherently difficult to implement in constant time. Because constant-time properties can be broken during compilation, it is often necessary to analyze the compiled binary directly. Since manual binary analysis is extremely challenging, automated analysis becomes highly important. Although several tools exist to assist with such analysis, they often have usability limitations and are difficult to set up correctly. To support the developers besides the NIST committee in verifying candidates, we developed a toolchain that automates configuration, execution, and result analysis for several widely used constant-time analysis tools. We selected TIMECOP and Binsec/Rel2 to verify constant-time policy compliance at the binary level, and dudect and RTLF to detect side-channel vulnerabilities through statistical analysis of execution time behavior. We demonstrate its effectiveness and practicability by evaluating the NIST PQDSS round 1 and round 2 implementations. We reported 26 issues in total to the respective developers, and 5 of them have already been fixed. We also discuss our different findings, as well as the benefits of shortcomings of the different tools.
Problem

Research questions and friction points this paper is trying to address.

Analyzing timing leakage vulnerabilities in NIST PQDSS cryptographic candidates
Automating constant-time verification for binary-level software implementations
Evaluating tool effectiveness for side-channel detection in post-quantum cryptography
Innovation

Methods, ideas, or system contributions that make the work stand out.

Automated toolchain for constant-time analysis
Combines binary-level and statistical timing leakage detection
Evaluated NIST PQDSS implementations with practical results
🔎 Similar Papers
No similar papers found.
O
Olivier Adjonyo
Technology Innovation Institute, Abu Dhabi, UAE
S
Sebastien Bardin
Université Paris-Saclay, CEA, List, F-91120, Palaiseau, France
Emanuele Bellini
Emanuele Bellini
Technology Innovation Institute, Abu Dhabi, UAE
G
Gilbert Ndollane Dione
Technology Innovation Institute, Abu Dhabi, UAE
M
Mahmudul Faisal Al Ameen
Université Paris-Saclay, CEA, List, F-91120, Palaiseau, France
Robert Merget
Robert Merget
Technology Innovation Institute (TII)
TLS
F
Frederic Recoules
Université Paris-Saclay, CEA, List, F-91120, Palaiseau, France
Y
Yanis Sellami
Université Paris-Saclay, CEA, List, F-91120, Palaiseau, France