SIKE Channels

Zero-Value Side-Channel Attacks on SIKE

Authors

  • Luca De Feo IBM Research Europe, Zürich, Switzerland
  • Nadia El Mrabet Mines Saint-Étienne, CEA-Tech, Centre CMP, Gardanne, France
  • Aymeric Genêt École Polytechnique Fédérale de Lausanne, Lausanne, Switzerland; Nagra Kudelski Group, Cheseaux-sur-Lausanne, Switzerland
  • Novak Kaluđerovi´c École Polytechnique Fédérale de Lausanne, Lausanne, Switzerland
  • Natacha Linard de Guertechin CYSEC SA, Lausanne, Switzerland
  • Simon Pontié CEA Tech, Centre CMP, Équipe Commune CEA Tech - Mines Saint-Étienne, F-13541 Gardanne, France; Université Grenoble Alpes, CEA-Leti, F-38000 Grenoble, France
  • Élise Tasso CEA Tech, Centre CMP, Équipe Commune CEA Tech - Mines Saint-Étienne, F-13541 Gardanne, France; Université Grenoble Alpes, CEA-Leti, F-38000 Grenoble, France

DOI:

https://doi.org/10.46586/tches.v2022.i3.264-289

Keywords:

SIKE, side-channel attack, zero-value attack, countermeasures, post-quantum cryptography, isogeny-based cryptography

Abstract

We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure. We show that coordinate randomization alone is not sufficient, because SIKE is vulnerable to a class of attacks similar to refined power analysis in elliptic curve cryptography, named zero-value attacks. We describe and confirm in the lab two such attacks leading to full key recovery, and analyze their countermeasures.

Downloads

Published

2022-06-08

Issue

Section

Articles

How to Cite

SIKE Channels: Zero-Value Side-Channel Attacks on SIKE. (2022). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(3), 264-289. https://doi.org/10.46586/tches.v2022.i3.264-289