International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023

Separating Oil and Vinegar with a Single Trace


Thomas Aulbach
University of Regensburg, Regensburg, Germany

Fabio Campos
RheinMain University of Applied Sciences, Wiesbaden, Germany; Radboud University, Nijmegen, Netherlands

Juliane Krämer
University of Regensburg, Regensburg, Germany

Simona Samardjiska
Radboud University, Nijmegen, Netherlands

Marc Stöttinger
RheinMain University of Applied Sciences, Wiesbaden, Germany


Keywords: Multivariate signature schemes, UOV, Side-channel attack, Kipnis- Shamir attack, Reconciliation attack


Abstract

Due to recent cryptanalytical breakthroughs, the multivariate signature schemes that seemed to be most promising in the past years are no longer in the focus of the research community. Hence, the cryptographically mature UOV scheme is of great interest again. Since it has not been part of the NIST process for standardizing post-quantum cryptography so far, it has not been studied intensively for its physical security. In this work, we present a side-channel attack on the latest implementation of UOV. In the first part of the attack, a single side-channel trace of the signing process is used to learn all vinegar variables used in the computation. Then, we employ a combination of the Kipnis-Shamir attack and the reconciliation attack to reveal the complete secret key. Our attack, unlike previous work, targets the inversion of the central map and not the subsequent linear transformation. It further does not require the attacker to control the message to be signed. We have verified the practicality of our attack on a ChipWhisperer-Lite board with a 32-bit STM32F3 ARM Cortex-M4 target mounted on a CW308 UFO board. We publicly provide the code and both reference and target traces. Additionally, we discuss several countermeasures that can at least make our attack less efficient.

Publication

Transactions of Cryptographic Hardware and Embedded Systems, Volume 2023, Issue 3

Paper

Artifact

Artifact number
tches/2023/a15

Artifact published
June 21, 2024

README

ZIP (81MB)  

View on Github

License
CC0 To the extent possible under law, the author(s) have waived all copyright and related or neighboring rights to this artifact.


BibTeX How to cite

Aulbach, T., Campos, F., Krämer, J., Samardjiska, S., & Stöttinger, M. (2023). Separating Oil and Vinegar with a Single Trace: Side-Channel Assisted Kipnis-Shamir Attack on UOV. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(3), 221–245. Artifact at https://artifacts.iacr.org/tches/2023/a15.