Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 理學院
  3. 應用數學科學研究所
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/87942
Title: 快速Dilithium 於Cortex-M4 平台實現的旁通道分析
Side-Channel Analysis of Faster Dilithium on Cortex-M4
Authors: 李昇峰
Sheng-Fong Li
Advisor: 陳君明
Jiun-Ming Chen
Keyword: 相關性能量分析攻擊,電子簽章,快速數論變換,模板攻擊,後量子密碼,司徒頓t檢定,
Correlation Power Analysis,Digital Signature,Number Theoretic Transform,Online Template Attack,Post-quantum Cryptography,Welch's T-test,
Publication Year : 2023
Degree: 碩士
Abstract: 隨者量子電腦的發展,後量子密碼演算法,將會取代現有的非對稱密碼系統。在2022 年七月,美國國家標準暨技術研究院,公布了標準化的後量子數位簽章法,Crystal-Dilithium 是三個標準的其中一個,也是三個之中可以在合理時間內,於Cortex-M4 上運行的後量子數位簽章。

2022 年一月,一種運行於 Cortex-M4 加速版本的 Dilthium 被研發出來,它在小係數多項式乘法有更快的運算,使得運行的時間被近一步地縮短,然而也使其對旁通道攻擊的弱點進一步地被放大。

本文使用了相關性能量分析攻擊(Correlation Power Analysis) 和 T 檢定(T-test), 將這兩種分析的方式結合,成功的攻擊了 Dilithium-2 的小係數多項式乘法,並且準確地還原其私鑰。Correlation Power Analysis 可以在短時間內,從66049 種可能性中找出最有可能的私鑰組合,而 Profiling T-test,則可從少數的組合中找到正確的答案,形成一個快速又有效果的攻擊方式。如果沒有使用 masking 或shuffling 進行防護,Dilithium 對於旁通道攻擊的防護是非常脆弱的。
With the development of quantum computers, post-quantum cryptography (PQC) and its digital signatures will replace asymmetric cryptographic systems. In July 2022, the National Institute of Standards and Technology (NIST) announced the standardized Postquantum signatures. Crystal-Dilithium is one of the three digital signature standards, and it is also one of the three that can run on the Cortex-M4 in a reasonable time. In January 2022, a faster version of Dilithium was developed. It has faster operations in small coefficient polynomial multiplication, further shortening the running time and amplifying its vulnerability to side-channel attacks.

This article uses the combination of Correlation Power Analysis and Profiling T-test to successfully attack Dilithium-2’s small coefficient polynomial multiplication to recover its sensitive information $s_1$ and $s_2$. Correlation Power Analysis can find the most likely $s_1$ and $s_2$ coefficient pairs from 66049 possibilities quickly. In contrast, the Profiling T-test can find the correct answer from a few candidates, forming a fast and effective attack method. Without the countermeasure of masking or shuffling for protection, Dilithium will be very vulnerable to side-channel attacks.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/87942
DOI: 10.6342/NTU202301181
Fulltext Rights: 同意授權(全球公開)
Appears in Collections:應用數學科學研究所

Files in This Item:
File SizeFormat 
ntu-111-2.pdf2 MBAdobe PDFView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved