Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations
In: Proceedings of 2022 25th Euromicro Conference on Digital System Design (DSD), 2022, S. 488-495
Online
unknown
Zugriff:
In the ongoing last round of NIST’s post-quantum cryptography standardization competition, side-channel analysis of finalists is a main focus of attention. While their resistance to timing, power and near field electromagnetic (EM) side-channels has been thoroughly investigated, amplitude-modulated EM emanations has not been considered so far.The attacks based on amplitude-modulated EM emanations are more stealthy because they exploit side-channels intertwined into the signal transmitted by the on-board antenna. Thus, they can be mounted on a distance from the device under attack.In this paper, we present the first results of an amplitude-modulated EM side-channel analysis of one of the NIST PQ finalists, Saber key encapsulation mechanism (KEM), implemented on the nRF52832 (ARM Cortex-M4) system-on-chip supporting Bluetooth 5.By capturing amplitude-modulated EM emanations during decapsulation, we can recover each bit of the session key with 0.91 probability on average.
Titel: |
Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations
|
---|---|
Autor/in / Beteiligte Person: | Wang, Ruize ; Ngo, Kalle ; Dubrova, Elena |
Link: | |
Zeitschrift: | Proceedings of 2022 25th Euromicro Conference on Digital System Design (DSD), 2022, S. 488-495 |
Veröffentlichung: | 2022 |
Medientyp: | unknown |
DOI: | 10.1109/DSD57027.2022.00071 |
Sonstiges: |
|