Correlation power analysis of LESS and CROSS

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

This paper presents a side-channel attack targeting the LESS and CROSS post-quantum digital signature schemes, resulting in full key recovery for both. These schemes have advanced to the second round of NIST’s call for additional signatures. By leveraging correlation power analysis and horizontal attacks, we are able to recover the secret key by observing the power consumption during the multiplication of an ephemeral secret vector with a public matrix. The attack path is enabled by the presence of a direct link between the secret key elements and the ephemeral secret, given correct responses. This attack targets version 1.2 of both schemes. In both settings we can recover the secret key in a single trace for the NIST’s security level I parameter set. Additionally, we propose improvements to the existing horizontal attack on CROSS, reducing the required rounds that need to be observed by an order of magnitude for the same parameter sets.
Original languageEnglish
Title of host publicationAfricacrypt 2025
Subtitle of host publicationProgress in Cryptology
Publication statusAccepted/In press - 2025
Event16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025 - Rabat, Morocco
Duration: 21 Jul 202523 Jul 2025

Conference

Conference16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025
Abbreviated titleAFRICACRYPT 2025
Country/TerritoryMorocco
CityRabat
Period21/07/2523/07/25

Keywords

  • Side-channel attacks
  • Post-quantum cryptography
  • CROSS
  • LESS

Fingerprint

Dive into the research topics of 'Correlation power analysis of LESS and CROSS'. Together they form a unique fingerprint.

Cite this