Disorientation Faults in CSIDH - Inria - Institut national de recherche en sciences et technologies du numérique Access content directly
Conference Papers Year : 2023

Disorientation Faults in CSIDH

Abstract

We investigate a new class of fault-injection attacks against the CSIDH family of cryptographic group actions. Our disorientation attacks effectively flip the direction of some isogeny steps. We achieve this by faulting a specific subroutine, connected to the Legendre symbol or Elligator computations performed during the evaluation of the group action. These subroutines are present in almost all known CSIDH implementations. Post-processing a set of faulty samples allows us to infer constraints on the secret key. The details are implementation specific, but we show that in many cases, it is possible to recover the full secret key with only a modest number of successful fault injections and modest computational resources. We provide full details for attacking the original CSIDH proof-of-concept software as well as the CTIDH constant-time implementation. Finally, we present a set of lightweight countermeasures against the attack and discuss their security.
Fichier principal
Vignette du fichier
2022-1202.pdf (676.49 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-04333521 , version 1 (18-12-2023)

Licence

Attribution

Identifiers

Cite

Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, et al.. Disorientation Faults in CSIDH. EUROCRYPT 2023 - Advances in Cryptology, Apr 2023, Lyon, France. pp.310-342, ⟨10.1007/978-3-031-30589-4_11⟩. ⟨hal-04333521⟩
54 View
13 Download

Altmetric

Share

Gmail Facebook X LinkedIn More