Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

FALCON signature vulnerability to special attacks and its protection

View through CrossRef
It is well known that quantum algorithms offer exponential speedup in solving the integer factorization and discrete logarithm problems that existing public-key systems rely on. Thus, post-quantum cryptography seeks alternative classical algorithms that can withstand quantum cryptanalysis. Growing concern about the quantum threat has prompted the National Institute of Standards and Technology (NIST) to invite and evaluate applications for a post-quantum cryptography standard, an ongoing process scheduled to be completed by 2023. Falcon is an electronic signature algorithm based on the mathematics of algebraic lattices. The disadvantage of this algorithm is the small number of studies of resistance against special attacks, as well as attacks through side channels. This material examines existing attacks on the implementation, and also analyzes the speed with applying countermeasures that would prevent such attacks. Although the Falcon scheme sampler, as well as certain mathematical transformations, are still vulnerable to attacks (which in turn allow the private key to be obtained), the efficiency of the components and mathematics of this signature algorithm make it competitive with other schemes, even with countermeasures against these attacks. The work will also consider the attack by side channels on the Falcon. Such an attack is a known-plaintext attack that uses the device's electromagnetic radiation to derive secret signature keys, which can then be used to forge signatures in arbitrary messages. The obtained results show that Falcon is quite vulnerable to side-channel attacks and does not yet have protection against such attacks in the proposed implementation. Because of this, standardization or implementation should consider the possibility of physical attacks, as well as options for countering such attacks.
Kharkiv National University of Radioelectronics
Title: FALCON signature vulnerability to special attacks and its protection
Description:
It is well known that quantum algorithms offer exponential speedup in solving the integer factorization and discrete logarithm problems that existing public-key systems rely on.
Thus, post-quantum cryptography seeks alternative classical algorithms that can withstand quantum cryptanalysis.
Growing concern about the quantum threat has prompted the National Institute of Standards and Technology (NIST) to invite and evaluate applications for a post-quantum cryptography standard, an ongoing process scheduled to be completed by 2023.
Falcon is an electronic signature algorithm based on the mathematics of algebraic lattices.
The disadvantage of this algorithm is the small number of studies of resistance against special attacks, as well as attacks through side channels.
This material examines existing attacks on the implementation, and also analyzes the speed with applying countermeasures that would prevent such attacks.
Although the Falcon scheme sampler, as well as certain mathematical transformations, are still vulnerable to attacks (which in turn allow the private key to be obtained), the efficiency of the components and mathematics of this signature algorithm make it competitive with other schemes, even with countermeasures against these attacks.
The work will also consider the attack by side channels on the Falcon.
Such an attack is a known-plaintext attack that uses the device's electromagnetic radiation to derive secret signature keys, which can then be used to forge signatures in arbitrary messages.
The obtained results show that Falcon is quite vulnerable to side-channel attacks and does not yet have protection against such attacks in the proposed implementation.
Because of this, standardization or implementation should consider the possibility of physical attacks, as well as options for countering such attacks.

Related Results

Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...
Vulnerability and informal caregiver: a scoping review
Vulnerability and informal caregiver: a scoping review
AbstractObjectiveThis review paper examines the concept of vulnerability in the overall literature and its relation to informal caregivers.Vulnerability is frequently associated wi...
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Recommender systems have become an integral part of online services due to their ability to help users locate specific information in a sea of data. However, existing studies show ...
The Analyses of Forest Fire Vulnerability at Taman Hutan Raya (Tahura) Nipa-Nipa Kendari City1
The Analyses of Forest Fire Vulnerability at Taman Hutan Raya (Tahura) Nipa-Nipa Kendari City1
Forest fires are one of the environmental problems that recur almost every year in Indonesia. This problem if not handled properly will certainly cause various negative impacts suc...
Insights into Egyptian Horus Falcon Imagery by Way of Real Falcons and Horus Falcon Influence in the Aegean in the Middle Bronze Age: Part I
Insights into Egyptian Horus Falcon Imagery by Way of Real Falcons and Horus Falcon Influence in the Aegean in the Middle Bronze Age: Part I
The falcon is the most frequently represented bird in Egyptian art. The discovery that falcons were depicted more often than realized in Aegean art, during the author’s studies of ...
Vulnerability Assessment of Groundwater Aquifers in Qatar
Vulnerability Assessment of Groundwater Aquifers in Qatar
Qatar peninsula is an arid country with limited water resources. With little rainfall of approximately 80 mm per year and no surface water, aquifers are the only source of natural ...

Back to Top