Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
Title | Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Facon, A., Guilley, S., Lec'Hvien, M., Schaub, A., Souissi, Y. |
Conference Name | 2018 IEEE 3rd International Verification and Security Workshop (IVSW) |
ISBN Number | 978-1-5386-6544-2 |
Keywords | cache storage, cache-timing attacks, cache-timing vulnerabilities, composability, cryptographic algorithms, dedicated vulnerability research tool, development cycle, Encryption, execution behavior, leakage pattern detection, Metrics, NIST, NIST post-quantum cryptography project submissions, NIST post-quantum standardization project, post-quantum cryptography algorithms, program diagnostics, Proposals, pubcrawl, quantum cryptography, source code, static analysis, taint analysis, Tools, validation tools |
Abstract | When implemented on real systems, cryptographic algorithms are vulnerable to attacks observing their execution behavior, such as cache-timing attacks. Designing protected implementations must be done with knowledge and validation tools as early as possible in the development cycle. In this article we propose a methodology to assess the robustness of the candidates for the NIST post-quantum standardization project to cache-timing attacks. To this end we have developed a dedicated vulnerability research tool. It performs a static analysis with tainting propagation of sensitive variables across the source code and detects leakage patterns. We use it to assess the security of the NIST post-quantum cryptography project submissions. Our results show that more than 80% of the analyzed implementations have at least one potential flaw, and three submissions total more than 1000 reported flaws each. Finally, this comprehensive study of the competitors security allows us to identify the most frequent weaknesses amongst candidates and how they might be fixed. |
URL | https://ieeexplore.ieee.org/document/8494855 |
DOI | 10.1109/IVSW.2018.8494855 |
Citation Key | facon_detecting_2018 |
- NIST post-quantum cryptography project submissions
- validation tools
- tools
- taint analysis
- static analysis
- source code
- quantum cryptography
- pubcrawl
- Proposals
- program diagnostics
- post-quantum cryptography algorithms
- NIST post-quantum standardization project
- cache storage
- NIST
- Metrics
- leakage pattern detection
- execution behavior
- encryption
- development cycle
- dedicated vulnerability research tool
- cryptographic algorithms
- composability
- cache-timing vulnerabilities
- cache-timing attacks