Paper 2025/582
Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium
Abstract
The Module-Lattice-Based Digital Signature Standard (ML-DSA), formerly known as CRYSTALS-Dilithium, is a lattice-based post-quantum cryptographic scheme. In August 2024, the National Institute of Standards and Technology (NIST) officially standardized ML-DSA under FIPS 204. Dilithium generates one valid signature and multiple rejected signatures during the signing process. Most Side-Channel Attacks targeting Dilithium have focused solely on the valid signature, while neglecting the hints contained in rejected signatures. In this paper, we propose a method for recovering the private key by simultaneously leveraging side-channel leakages from both valid signatures and rejected signatures. This approach minimizes the number of signing attempts required for full key recovery. We construct a factor graph incorporating all relevant side-channel leakages and apply the Belief Propagation (BP) algorithm for private key recovery. We conducted a proof-of-concept experiment on a Cortex M4 core chip, where the results demonstrate that utilizing rejected signatures reduces the required number of traces by at least $42\%$ for full key recovery. A minimum of a single trace can recover the private key with a success rate of $30\%$. Our findings highlight that protecting rejected signatures is crucial, as their leakage provides valuable side-channel information. We strongly recommend implementing countermeasures for rejected signatures during the signing process to mitigate potential threats.
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- DilithiumML-DSASide-Channel Attacksrejected signaturesBelief Propagation
- Contact author(s)
-
lzz73092 @ gmail com
wangan @ bit edu cn
weicm @ bit edu cn
dy119 @ bit edu cn
zhangjq @ bit edu cn
annvliu @ bit edu cn
liehuangz @ bit edu cn - History
- 2025-04-01: approved
- 2025-03-31: received
- See all versions
- Short URL
- https://ia.cr/2025/582
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/582, author = {Zheng Liu and An Wang and Congming Wei and Yaoling Ding and Jingqi Zhang and Annyu Liu and Liehuang Zhu}, title = {Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/582}, year = {2025}, url = {https://eprint.iacr.org/2025/582} }