Paper 2024/238
A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium
Abstract
CRYSTALS-Dilithium is a post-quantum secure digital signature algorithm currently being standardised by NIST. As a result, devices making use of CRYSTALS-Dilithium will soon become generally available and be deployed in various environments. It is thus important to assess the resistance of CRYSTALS-Dilithum implementations to physical attacks. In this paper, we present an attack on a CRYSTALS-Dilithium implementation in hedged mode in ARM Cortex-M4 using fault injection. Voltage glitching is performed to skip computation of a seed during the generation of the signature. We identified settings that consistently skip the desired function without crashing the device. After the successful fault injection, the resulting signature allows for the extraction of the secret key vector. Our attack succeeds with probability 0.582 in a single trace. We also propose countermeasures against the presented attack.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. Minor revision. 2024 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
- DOI
- 10.1109/FDTC64268.2024.00013
- Keywords
- Fault injectionCRYSTALS-DilithiumML-DSAPost-quantum digital signatureKey recovery attack
- Contact author(s)
- jendral @ kth se
- History
- 2024-11-12: revised
- 2024-02-14: received
- See all versions
- Short URL
- https://ia.cr/2024/238
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/238, author = {Sönke Jendral}, title = {A Single Trace Fault Injection Attack on Hedged {CRYSTALS}-Dilithium}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/238}, year = {2024}, doi = {10.1109/FDTC64268.2024.00013}, url = {https://eprint.iacr.org/2024/238} }