Correlation power analysis of LESS and CROSS

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

This paper presents a side-channel attack targeting the LESS and CROSS post-quantum digital signature schemes, resulting in full key recovery for both. These schemes have advanced to the second round of NIST’s call for additional signatures. By leveraging correlation power analysis and horizontal attacks, we are able to recover the secret key by observing the power consumption during the multiplication of an ephemeral secret vector with a public matrix. The attack path is enabled by the presence of a direct link between the secret key elements and the ephemeral secret, given correct responses. This attack targets version 1.2 of both schemes. In both settings we can recover the secret key in a single trace for the NIST’s security level I parameter set. Additionally, we propose improvements to the existing horizontal attack on CROSS, reducing the required rounds that need to be observed by an order of magnitude for the same parameter sets.
Originalspracheenglisch
TitelAfricacrypt 2025
UntertitelProgress in Cryptology
PublikationsstatusAngenommen/In Druck - 2025
Veranstaltung16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025 - Rabat, Marokko
Dauer: 21 Juli 202523 Juli 2025

Konferenz

Konferenz16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025
KurztitelAFRICACRYPT 2025
Land/GebietMarokko
OrtRabat
Zeitraum21/07/2523/07/25

Fingerprint

Untersuchen Sie die Forschungsthemen von „Correlation power analysis of LESS and CROSS“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren