期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
TtLR:A Lightweight and Transferable Side Channel Distinguisher Against Kyber
1
作者 GUO Shao-Qing CHEN Peng CHENG Chi 《密码学报(中英文)》 北大核心 2025年第6期1430-1444,共15页
Plaintext-checking(PC)oracle-based key recovery attack stands out as one of the most critical threat targeting Kyber due to its high effciency and ease of implementation.In practical scenarios,however,the output of th... Plaintext-checking(PC)oracle-based key recovery attack stands out as one of the most critical threat targeting Kyber due to its high effciency and ease of implementation.In practical scenarios,however,the output of the oracle may suffer accuracy degradation when instantiating it through a side-channel trace distinguisher due to the environmental noise and the cross-device issue.While various deep learning-based approaches have been proposed to address the inaccuracy problem caused by the cross-device issue,they often suffer from complexity and limited interpretability.This work investigates realistic numerous side-channel attack(SCA)scenarios and focuses on the cross-device issue when implementing a reliable PC oracle in SCAs against Kyber.TtLR is proposed,it combines the ttest with a logistic regression model to implement a lightweight but effcient side-channel distinguisher against Kyber KEM.The proposed approach is validated through experiments on STM32F407G boards equipped with ARM Cortex-M4 microcontrollers,using the Kyber512 implementations from the pqm4 library.The results demonstrate that the proposed method achieves high PC oracle accuracy across different boards with low computational and memory overhead.This makes the proposed distinguisher practical for deployment on resource-constrained platforms such as the Raspberry Pi running a Linux system. 展开更多
关键词 CRYSTALS-Kyber side-channel analysis transferablity lightweight implementation
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部