WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography.

2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)(2022)

引用 0|浏览2
暂无评分
摘要
FIPS 140-3 is the main standard defining security requirements for cryptographic modules in U.S. and Canada; commercially viable hardware modules generally need to be compliant with ii. The scope of FIPS 140-3 will also expand to the new NEST Post-Quantum Cryptography (PQC) standards when migration from older RSA and Elliptic Curve cryptography begins. FIPS 140-3 mandates the testing of the effectiveness of "non-invasive attack mitigations", or side-channel attack countermeasures. At higher security levels 3 and 4, the FIPS 140-3 side-channel testing methods and metrics are expected to be those of ISO 17825, which is based on the older Test Vector Leakage Assessment (TVLA) methodology. We discuss how to apply ISO 17825 to hardware modules that implement lattice-based PQC standards for public-key cryptography - Key Encapsulation Mechanisms (KEMs) and Digital Signatures. We find that simple "random key" vs. "fixed key" tests are unsatisfactory due to the close linkage between public and private components of PQC keypairs. While the general statistical testing approach and requirements can remain consistent with older public-key algorithms, a non-trivial challenge in creating ISO 17825 testing procedures for PQC is the careful design of test vector inputs so that only relevant Critical Security Parameter (CSP) leakage is captured in power, electromagnetic, and timing measurements.
更多
查看译文
关键词
FIPS 140-3,Post-Quantum Cryptography,Side-Channel Attacks,DPA,DEMA,TVLA,ISO 17825
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要