Paper 2025/319

Single Trace Side-Channel Vulnerabilities Discovery Using Statistical Leakage Simulator

Jinyi Qiu, North Carolina State University
Abstract

This paper presents a novel single-trace side-channel attack on FALCON—a lattice-based post-quantum digital signature protocol recently approved for standardization by NIST. We target the discrete Gaussian sampling operation within the FALCON key generation scheme and use a single power measurement trace to succeed. Notably, negating the ‘shift right 63-bit’ operation (for 64-bit values) leaks critical information about the ‘-1’ vs. ‘0’ assignments to intermediate coefficients. These leaks enable full recovery of the generated secret keys. The proposed attack is simulated on the ELMO simulator running both reference and optimized software implementation from FALCON’s NIST Round 3 package. Statistical analysis with 20k tests reveals a full key-recovery success rate of 100% for FALCON-512. This work highlights the vulnerability of current software solutions to single-trace attacks and underscores the urgent need to develop single-trace resilient software for embedded systems in the presilicon phase.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side-Channal AttackFALCONpost-quantum CryptographyELMO
Contact author(s)
jqiu2 @ ncsu edu
History
2025-02-24: approved
2025-02-21: received
See all versions
Short URL
https://ia.cr/2025/319
License
Creative Commons Attribution-NonCommercial-NoDerivs
CC BY-NC-ND

BibTeX

@misc{cryptoeprint:2025/319,
      author = {Jinyi Qiu},
      title = {Single Trace Side-Channel Vulnerabilities Discovery Using Statistical Leakage Simulator},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/319},
      year = {2025},
      url = {https://eprint.iacr.org/2025/319}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.