Cache-Timing Attack Against HQC
Files
(Published version)
Date
2023
Authors
Huang, S.
Sim, R.Q.
Chuengsatiansup, C.
Guo, Q.
Johansson, T.
Editors
Advisors
Journal Title
Journal ISSN
Volume Title
Type:
Journal article
Citation
Transactions on Cryptographic Hardware and Embedded Systems, 2023; 2023(3):136-163
Statement of Responsibility
Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo and Thomas Johansson
Conference Name
Abstract
In this paper, we present the first chosen-ciphertext (CC) cache-timing attacks on the reference implementation of HQC. We build a cache-timing based distinguisher for implementing a plaintext-checking (PC) oracle. The PC oracle uses side-channel information to check if a given ciphertext decrypts to a given message. This is done by identifying a vulnerability during the generating process of two vectors in the reference implementation of HQC. We also propose a new method of using PC oracles for chosen-ciphertext side-channel attacks against HQC, which may have independent interest.We show a general proof-of-concept attack, where we use the Flush+Reload technique and also derive, in more detail, a practical attack on an HQC execution on Intel SGX, where the Prime+Probe technique is used. We show the exact path to do key recovery by explaining the detailed steps, using the PC oracle. In both scenarios, the new attack requires 53, 857 traces on average with much fewer PC oracle calls than the timing attack of Guo et al. CHES 2022 on an HQC implementation.
School/Discipline
Dissertation Note
Provenance
Description
Access Status
Rights
© 2023 Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson. Licensed under Creative Commons License CC-BY 4.0.