Title :
A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem
Author :
Kamal, Abdel Alim ; Youssef, Amr M.
Author_Institution :
Electr. & Comput. Eng. Dept., Concordia Univ., Montreal, QC, Canada
Abstract :
Scan-based Design-for-Test (DFT) is a widely deployed technique for testing hardware chips. Using this approach, all flip-flops in the design under test are connected to a scan chain where their states can be scanned out through this chain during the testing phase. Scan-based side channel attacks exploit the information obtained by analyzing the scanned data in order to retrieve secret information from cryptographic hardware devices that are designed with this testability feature. The NTRU encryption algorithm (NTRUEncrypt) is a parameterized family of lattice-based public key cryptosystems which has recently been accepted to the IEEE P1363 standards under the specifications for lattice-based public-key cryptography. In this paper, we present a scan-based side channel attack on NTRUEncrypt hardware implementations that employ scan based DFT techniques. Our attack determines the scan chain structure of the polynomial multiplication circuits used in the decryption algorithm which allows the cryptanalyst to efficiently retrieve the secret key.
Keywords :
IEEE standards; design for testability; flip-flops; logic testing; public key cryptography; DFT techniques; IEEE P1363 standards; NTRU encryption algorithm; NTRUEncrypt cryptosystem; cryptanalyst; cryptographic hardware devices; flip-flops; hardware chip testing; lattice-based public key cryptosystems; scan-based design-for-test; scan-based side channel attack; secret information retrieve; Convolution; Encryption; Hamming weight; Hardware; Polynomials; Registers; NTRU; public key cryptography; scan-based attacks; side channel attacks;
Conference_Titel :
Availability, Reliability and Security (ARES), 2012 Seventh International Conference on
Conference_Location :
Prague
Print_ISBN :
978-1-4673-2244-7
DOI :
10.1109/ARES.2012.14