Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

03/13/2022
by   Animesh Basak Chowdhury, et al.
0

NIST is standardizing Post Quantum Cryptography (PQC) algorithms that are resilient to the computational capability of quantum computers. Past works show malicious subversion with cryptographic software (algorithm subversion attacks) that weaken the implementations. We show that PQC digital signature codes can be subverted in line with previously reported flawed implementations that generate verifiable, but less-secure signatures, demonstrating the risk of such attacks. Since, all processors have built-in Hardware Performance Counters (HPCs), there exists a body of work proposing a low-cost Machine Learning (ML)-based integrity checking of software using HPC fingerprints. However, such HPC-based approaches may not detect subversion of PQC codes. A miniscule percentage of qualitative inputs when applied to the PQC codes improve this accuracy to 98 inputs to aid the HPC-based method.

READ FULL TEXT

page 1

page 9

page 12

research
12/20/2022

An Evaluation of the State-of-the-Art Software and Hardware Implementations of BIKE

NIST is conducting a process for the standardization of post-quantum cry...
research
04/13/2019

SPHINCS^+ digital signature scheme with GOST hash functions

Many commonly used public key cryptosystems will become insecure once a ...
research
07/16/2018

Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes

In this paper we consider a post-quantum digital signature scheme based ...
research
09/20/2021

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

Due to the advancing development of quantum computers, practical attacks...
research
01/05/2022

Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA

Side Channel Analysis attacks take advantage of the information leaked f...
research
08/29/2023

Area Efficient Modular Reduction in Hardware for Arbitrary Static Moduli

Modular reduction is a crucial operation in many post-quantum cryptograp...
research
08/31/2019

Detecting Covert Cryptomining using HPC

Cybercriminals have been exploiting cryptocurrencies to commit various u...

Please sign up or login with your details

Forgot password? Click here to reset