z-logo
open-access-imgOpen Access
Power Analysis on NTRU Prime
Author(s) -
WeiPing Huang,
Jiun-Peng Chen,
BoYin Yang
Publication year - 2019
Publication title -
iacr transactions on cryptographic hardware and embedded systems
Language(s) - English
Resource type - Journals
ISSN - 2569-2925
DOI - 10.46586/tches.v2020.i1.123-151
Subject(s) - ntru , nist , computer science , cryptosystem , cryptography , theoretical computer science , power analysis , a priori and a posteriori , computer engineering , algorithm , natural language processing , philosophy , epistemology
This paper applies a variety of power analysis techniques to several implementations of NTRU Prime, a Round 2 submission to the NIST PQC Standardization Project. The techniques include vertical correlation power analysis, horizontal indepth correlation power analysis, online template attacks, and chosen-input simple power analysis. The implementations include the reference one, the one optimized using smladx, and three protected ones. Adversaries in this study can fully recover private keys with one single trace of short observation span, with few template traces from a fully controlled device similar to the target and no a priori power model, or sometimes even with the naked eye. The techniques target the constant-time generic polynomial multiplications in the product scanning method. Though in this work they focus on the decapsulation, they also work on the key generation and encapsulation of NTRU Prime. Moreover, they apply to the ideal-lattice-based cryptosystems where each private-key coefficient comes from a small set of possibilities.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here