Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP

Authors

  • Vincent Quentin Ulitzsch Technical University Berlin, Berlin, Germany
  • Soundes Marzougui Technical University Berlin, Berlin, Germany; STMicroelectronics, Diegem, Belgium
  • Alexis Bagia Technical University Berlin, Berlin, Germany
  • Mehdi Tibouchi NTT Social Informatics Laboratories, Tokyo, Japan
  • Jean-Pierre Seifert Technical University Berlin, Berlin, Germany; Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany

DOI:

https://doi.org/10.46586/tches.v2023.i4.367-392

Keywords:

Fault analysis, Fiat–Shamir with aborts, Dilithium, Side-channel attacks, Integer linear programming

Abstract

At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature schemes following the Fiat–Shamir with aborts paradigm. Their attack recovered the signing key by injecting faults in the sampling of the commitment vector (also called masking vector) y, leaving its coefficients at their initial zero value. As possible countermeasures, they proposed to carry out the sampling of the coefficients of y in shuffled order, or to ensure that the masking polynomials in y are not of low degree. In this paper, we show that both of these countermeasures are insufficient. We demonstrate a new loop-abort fault injection attack against Fiat–Shamir with aborts lattice-based signatures that can recover the secret key from faulty signatures even when the proposed countermeasures are implemented. The key idea of our attack is that faulted signatures give rise to a noisy linear system of equations, which can be solved using integer linear programming. We present an integer linear program that recovers the secret key efficiently in practice, and validate the efficacy of our attack by conducting a practical end-to-end attack against a shuffled version of the Dilithium reference implementation, mounted on an ARM Cortex M4. We achieve a full (equivalent) key recovery in under 3 minutes total execution time (including signature generation), using only 5 faulted signatures. In addition, we conduct extensive theoretical simulations of the attack against Dilithium. We find that our method can achieve key recovery in under 5 minutes given a (sufficiently large) set of signatures where just one of the coefficients of y is zeroed out (or left at its initial value of zero). Furthermore, we find that our attack works against all security levels of Dilithium. Our attack shows that protecting Fiat–Shamir with aborts lattice-based signatures against fault injection attacks cannot be achieved using the simple countermeasures proposed by Espitau et al. and likely requires significantly more expensive countermeasures.

Downloads

Published

2023-08-31

Issue

Section

Articles

How to Cite

Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP. (2023). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(4), 367-392. https://doi.org/10.46586/tches.v2023.i4.367-392