MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4
Abstract: CRYSTALS-Kyber, one of the NIST PQC standardization schemes, has garnered considerable attention from researchers in recent years for its side-channel security. Various targets have been explored in previous studies; however, research on extracting secret information from stack-optimized implementations targeting the Cortex-M4 remains scarce, primarily due to the lack of memory access operations, which increases the difficulty of attacks. This paper shifts the focus to the leakage of multiply instructions and present a novel cycle-level regression-based leakage model for the following attacks. We target the polynomial multiplications in decryption process of the stack-optimized implementation targeting the Cortex-M4, and propose two regression-based profiled attacks leveraging known ciphertext and chosen ciphertext methodologies to recover the secret coefficients individually. The later one can also be extended to the protected implementation. Our practical evaluation, conducted on.... https://tches.iacr.org/index.php/TCHES/article/view/12041
- Standort
-
Deutsche Nationalbibliothek Frankfurt am Main
- Umfang
-
Online-Ressource
- Sprache
-
Englisch
- Erschienen in
-
MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4 ; volume:2025 ; number:2 ; year:2025
IACR transactions on cryptographic hardware and embedded systems ; 2025, Heft 2 (2025)
- Urheber
-
Huang, Fan
Duan, Xiaolin
Hu, Chengcong
Zheng, Mengce
Hu, Honggang
- DOI
-
10.46586/tches.v2025.i2.23-68
- URN
-
urn:nbn:de:101:1-2503121801353.365954731122
- Rechteinformation
-
Open Access; Der Zugriff auf das Objekt ist unbeschränkt möglich.
- Letzte Aktualisierung
- 15.08.2025, 07:33 MESZ
Datenpartner
Deutsche Nationalbibliothek. Bei Fragen zum Objekt wenden Sie sich bitte an den Datenpartner.
Beteiligte
- Huang, Fan
- Duan, Xiaolin
- Hu, Chengcong
- Zheng, Mengce
- Hu, Honggang