Protecting Dilithium against Leakage
Revisited Sensitivity Analysis and Improved Implementations
DOI:
https://doi.org/10.46586/tches.v2023.i4.58-79Keywords:
CRYSTALS-Dilithium, Lattice-Based Cryptography, Post-Quantum Cryptography, Signatures, Side-Channel Countermeasures, MaskingAbstract
CRYSTALS-Dilithium has been selected by the NIST as the new standard for post-quantum digital signatures. In this work, we revisit the side-channel countermeasures of Dilithium in three directions. First, we improve its sensitivity analysis by classifying intermediate computations according to their physical security requirements. Second, we provide improved gadgets dedicated to Dilithium, taking advantage of recent advances in masking conversion algorithms. Third, we combine these contributions and report performance for side-channel protected Dilithium implementations. Our benchmarking results additionally put forward that the randomized version of Dilithium can lead to significantly more efficient implementations (than its deterministic version) when side-channel attacks are a concern.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Tobias Schneider, Markus Schönauer, François-Xavier Standaert, Christine van Vredendaal
This work is licensed under a Creative Commons Attribution 4.0 International License.