All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F23%3A00364712" target="_blank" >RIV/68407700:21240/23:00364712 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.scitepress.org/PublicationsDetail.aspx?ID=jglEMGErIrg=&t=1" target="_blank" >https://www.scitepress.org/PublicationsDetail.aspx?ID=jglEMGErIrg=&t=1</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.5220/0011729200003405" target="_blank" >10.5220/0011729200003405</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key

  • Original language description

    NTRU is a post-quantum public-key, lattice-based cryptosystem. Several suggested implementations claim to be simple-power analysis resistant. One of these implementations was described in (An et al., 2018) using a sparse representation of a private key and a new design of an algorithm for the multiplication of polynomials. We show that it is still vulnerable. We theoretically explain a vulnerability in the algorithm description that could potentially lead to a single-trace attack. We practically perform the attack on two targets with different architectures: an 8-bit microcontroller of the AVR family and a 32-bit microcontroller ARM Cortex-M0. Statistical analysis performed on the second target, measured by the ChipWhisperer platform, shows that with a chance of 91.0% we get the correct key just from one measured trace. Ability to get two measurements raises our probability of a successful attack up to 99.6%.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    <a href="/en/project/EF16_019%2F0000765" target="_blank" >EF16_019/0000765: Research Center for Informatics</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the 9th International Conference on Information Systems Security and Privacy

  • ISBN

    978-989-758-624-8

  • ISSN

    2184-4356

  • e-ISSN

  • Number of pages

    9

  • Pages from-to

    135-143

  • Publisher name

    SciTePress

  • Place of publication

    Madeira

  • Event location

    Lisbon

  • Event date

    Feb 22, 2023

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article