Preprint Article Version 1 This version is not peer-reviewed

Single Trace Analysis of Visible vs. Invisible Leakage for Comparison Operation Based CDT Sampling

Version 1 : Received: 22 October 2024 / Approved: 22 October 2024 / Online: 23 October 2024 (07:22:43 CEST)

How to cite: Choi, K.-H.; Han, J.; Han, D.-G. Single Trace Analysis of Visible vs. Invisible Leakage for Comparison Operation Based CDT Sampling. Preprints 2024, 2024101776. https://doi.org/10.20944/preprints202410.1776.v1 Choi, K.-H.; Han, J.; Han, D.-G. Single Trace Analysis of Visible vs. Invisible Leakage for Comparison Operation Based CDT Sampling. Preprints 2024, 2024101776. https://doi.org/10.20944/preprints202410.1776.v1

Abstract

The emergence of quantum computers poses a significant threat to the security of conventional public-key cryptosystems, driving the demand for quantum-resistant cryptographic solutions. In response, NIST conducted a multi-year competition, ultimately selecting four ciphers. Among these, Falcon employs CDT sampling, which produces arrays of random values derived from a discrete Gaussian distribution during the signature generation phase. This array is then used with secret key information, forming the core of Falcon. Enhanced variants of Falcon, such as Mitaka, SOLMAE, and Antrag, implemented CDT sampling using comparison operations. Previous research by Choi et al. proposed a single trace analysis and countermeasure for CDT sampling, which exploited a non-constant-time vulnerability in 8-bit AVR microcontrollers. However, this vulnerability is specific to certain environments, and a potentioal vulnerability in comparison operation based constant-time CDT sampling remain not studied. This paper is an extension of that study. This paper investigates the constant-time operation of comparison operation-based CDT sampling on Arm Cortex-M4-based chips and proposes a deep learning-based side-channel analysis to recover the sampling values using novel vulnerability. The proposed model achieves an F1 score of 1.0 and a recovery success rate of 99.97%.

Keywords

deep-learning; post-quantum cryptography; Falcon; side-channel analysis; single trace analysis; CDT Sampling; 8-bit AVR; 32-bit Arm Cortex-M4

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.