Due to the advancing development of quantum computers, practical attacks on conventional public-key cryptography may become feasible in the next few decades. To address this risk, post-quantum schemes that are secure against quantum attacks are being developed. Lattice-based algorithms are promising replacements for conventional schemes, with BLISS being one of the earliest post-quantum signature schemes in this family. However, required subroutines such as Gaussian sampling have been demonstrated to be a risk for the security of BLISS, since implementing Gaussian sampling both efficient and secure with respect to physical attacks is highly challenging. This paper presents three related power side-channel attacks on GALACTICS, the latest constant-time implementation of BLISS. All attacks are based on leakages we identified in the Gaussian sampling and signing algorithm of GALACTICS. To run the attack, a profiling phase on a device identical to the device under attack is required to train machine learning classifiers. In the attack phase, the leakages of GALACTICS enable the trained classifiers to predict sensitive internal information with high accuracy, paving the road for three different key recovery attacks. We demonstrate the leakages by running GALACTICS on a Cortex-M4 and provide proof-of-concept data and implementation for all our attacks.
翻译:由于量子计算机的发展,今后几十年内对常规公用钥匙加密技术的实际攻击可能变得可行。为了应对这一风险,正在制订防止量子攻击的量子加密后方案。基于拉蒂的算法很有希望地取代常规办法,而BLISS是这个家庭最早的量子计算机后签字办法之一。然而,高萨取样等必要次方案已证明对BLISS的安全构成危险,因为实施高萨抽样对人身攻击的有效和安全的取样是极具挑战性的。本文介绍了GALACTICS的三种相关电源侧道攻击,这是BLISS的最新经常执行。所有攻击都是基于我们在Gaussian取样和签署GALACTICS时发现的渗漏。为了进行攻击,需要对与被攻击的装置相同的装置进行剖析阶段来培训机器学习分级人员。在攻击阶段,加拉西科技系统的渗漏使得受过训练的分类人员能够以高精确度预测内部敏感信息,为GALACTIS最新执行B4号攻击的所有关键证据。我们用CR-CS系统进行的所有关键复原试验证明。