Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques

dc.contributor.authorChiu, Tinghungen
dc.contributor.authorLeGrow, Jasonen
dc.contributor.authorXiong, Wenjieen
dc.date.accessioned2024-12-03T18:12:23Zen
dc.date.available2024-12-03T18:12:23Zen
dc.date.issued2024-11-19en
dc.date.updated2024-12-01T09:01:58Zen
dc.description.abstract<i>Commutative Supersingular Isogeny Diffie-Hellman</i> (CSIDH) is an isogeny-based key exchange protocol which is believed to be secure even when parties use long-lived secret keys. To secure CSIDH against side-channel attacks, constant-time implementations with additional dummy isogeny computations are employed. In this study, we demonstrate a fault injection attack on the constant-time real-then-dummy CSIDH to recover the full static secret key. We prototype the attack using voltage glitches on the victim STM32 microcontroller. The attack scheme, which is based on existing research which has yet to be practically implemented, involves getting the faulty output by injecting the fault in a binary search fashion. Our attack reveals many practical factors that were not considered in the previous theoretical fault injection attack analysis, e.g., the probability of a failed fault injection. We bring the practice to theory and developed new complexity analysis of the attack. Further, to mitigate the possible binary search attack on real-then-dummy CSIDH, dynamic random vector CSIDH was proposed previously to randomize the order of real and dummy isogeny operations. We explore fault injection attacks on dynamic random vector CSIDH and evaluate the security level of the mitigation. Our analysis and experimental results demonstrate that it is infeasible to attack dynamic random vector CSIDH in a reasonable amount of time when the success rate of fault injection is not consistent over time.en
dc.description.versionPublished versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1145/3689939.3695789en
dc.identifier.urihttps://hdl.handle.net/10919/123719en
dc.language.isoenen
dc.publisherACMen
dc.rightsCreative Commons Attribution-NonCommercial-ShareAlike 4.0 Internationalen
dc.rights.holderThe author(s)en
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en
dc.titlePractical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniquesen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3689939.3695789.pdf
Size:
1.19 MB
Format:
Adobe Portable Document Format
Description:
Published version
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.5 KB
Format:
Item-specific license agreed upon to submission
Description: