Single trace side channel analysis on NTRU implementation

  • Soojung An
  • , Suhri Kim
  • , Sunghyun Jin
  • , Han Bit Kim*
  • , Hee Seok Kim
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against the quantum adversary. Although NTRU has withstood various algebraic attacks, its side-channel resistance must also be considered for secure implementation. In this paper, we proposed the first single trace attack on NTRU. Previous side-channel attacks on NTRU used numerous power traces, which increase the attack complexity and limit the target algorithm. There are two versions of NTRU implementation published in succession. We demonstrated our attack on both implementations using a single power consumption trace obtained in the decryption phase. Furthermore, we propose a countermeasure to prevent the proposed attacks. Our countermeasure does not degrade in terms of performance.

Original languageEnglish
Article number2014
JournalApplied Sciences (Switzerland)
Volume8
Issue number11
DOIs
Publication statusPublished - 2018 Oct 23

Bibliographical note

Publisher Copyright:
© 2018 by the authors.

Keywords

  • NTRU
  • Post quantum cryptography
  • Side channel analysis
  • Single trace analysis

ASJC Scopus subject areas

  • General Materials Science
  • Instrumentation
  • General Engineering
  • Process Chemistry and Technology
  • Computer Science Applications
  • Fluid Flow and Transfer Processes

Fingerprint

Dive into the research topics of 'Single trace side channel analysis on NTRU implementation'. Together they form a unique fingerprint.

Cite this