SMAUG-T 곱셈 연산에 대한 단순전력분석 공격 및 대응기법

Vol. 35, No. 1, pp. 25-35, 2월. 2025
10.13089/JKIISC.2025.35.1.25, Full Text:
Keywords: Side-Channel Analysis, Korean Post-Quantum Cryptography, Single-Trace Attack, Countermeasure
Abstract

Recently, with the development of quantum computers, active research on quantum-resistant cryptography (PQC) has been conducted. In Korea, the domestic PQC National Competition (KPQC) has started in 2022, and eight algorithms have been selected as second-round candidates and are being evaluated. This paper presents two new simple power analysis vulnerabilities and the possibility of secret key information leakage using SMAUG-T, a lattice-based PKE/KEM algorithm. The SMAUG-T algorithm implements polynomial multiplication according to the sparse ternary characteristic of the secret key coefficients. This paper shows that the polynomial multiplication structure does not satisfy constant time and that power differences occur depending on the value of the secret key coefficients. In addition, we propose a method to recover the number of 1, 0, and -1 among the coefficients of each secret key polynomial with a single power waveform through the vulnerability, and showed that the secret key information was recovered in an ARM Cortex-M4-based MCU environment. Additionally, we proposed a countermeasure technique and experimentally verified the safety of the countermeasure technique by performing the proposed simple power analysis attack in the same environment. We also evaluated the performance by measuring the number of cycles and the overhead in memory.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
유성환, 한동국, 한재승, "Simple Power Analysis and Countermeasure for SMAUG-T Multiplication Operation," Journal of The Korea Institute of Information Security and Cryptology, vol. 35, no. 1, pp. 25-35, 2025. DOI: 10.13089/JKIISC.2025.35.1.25.

[ACM Style]
유성환, 한동국, and 한재승. 2025. Simple Power Analysis and Countermeasure for SMAUG-T Multiplication Operation. Journal of The Korea Institute of Information Security and Cryptology, 35, 1, (2025), 25-35. DOI: 10.13089/JKIISC.2025.35.1.25.