Paper 2025/582

Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium

Zheng Liu, Beijing Institute of Technology
An Wang, Beijing Institute of Technology
Congming Wei, Beijing Institute of Technology
Yaoling Ding, Beijing Institute of Technology
Jingqi Zhang, Beijing Institute of Technology
Annyu Liu, Beijing Institute of Technology
Liehuang Zhu, Beijing Institute of Technology
Abstract

The Module-Lattice-Based Digital Signature Standard (ML-DSA), formerly known as CRYSTALS-Dilithium, is a lattice-based post-quantum cryptographic scheme. In August 2024, the National Institute of Standards and Technology (NIST) officially standardized ML-DSA under FIPS 204. Dilithium generates one valid signature and multiple rejected signatures during the signing process. Most Side-Channel Attacks targeting Dilithium have focused solely on the valid signature, while neglecting the hints contained in rejected signatures. In this paper, we propose a method for recovering the private key by simultaneously leveraging side-channel leakages from both valid signatures and rejected signatures. This approach minimizes the number of signing attempts required for full key recovery. We construct a factor graph incorporating all relevant side-channel leakages and apply the Belief Propagation (BP) algorithm for private key recovery. We conducted a proof-of-concept experiment on a Cortex M4 core chip, where the results demonstrate that utilizing rejected signatures reduces the required number of traces by at least $42\%$ for full key recovery. A minimum of a single trace can recover the private key with a success rate of $30\%$. Our findings highlight that protecting rejected signatures is crucial, as their leakage provides valuable side-channel information. We strongly recommend implementing countermeasures for rejected signatures during the signing process to mitigate potential threats.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
DilithiumML-DSASide-Channel Attacksrejected signaturesBelief Propagation
Contact author(s)
lzz73092 @ gmail com
wangan @ bit edu cn
weicm @ bit edu cn
dy119 @ bit edu cn
zhangjq @ bit edu cn
annvliu @ bit edu cn
liehuangz @ bit edu cn
History
2025-04-01: approved
2025-03-31: received
See all versions
Short URL
https://ia.cr/2025/582
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/582,
      author = {Zheng Liu and An Wang and Congming Wei and Yaoling Ding and Jingqi Zhang and Annyu Liu and Liehuang Zhu},
      title = {Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/582},
      year = {2025},
      url = {https://eprint.iacr.org/2025/582}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.