Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication
Published in Preprint / Work in Progress, 2023
This work presents a novel side-channel template attack on the Kyber Key Encapsulation Mechanism, targeting the pair-pointwise multiplication step used in the decapsulation process.
Main contributions:
- Exploits leakage from isolated coefficient multiplications in NTT domain, even in DPA-masked implementations
- Effective against shuffling countermeasures
- Works with known ciphertexts, not only chosen ones
- Demonstrates success via Hamming weight simulations and template difference analysis
- Suggests that masking and shuffling alone are insufficient for lattice-based schemes like Kyber
The simplicity and generality of the attack show the urgent need for more robust countermeasures against side-channel vulnerabilities in post-quantum cryptographic implementations.
Recommended citation: Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Łukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Šorf. (2023). "Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication." Preprint.
Download Paper