Simple Power Analysis Attack on SQIsign

Anisha Mukherjee, Maciej Czuprynko, David Jacquemin, Péter Kutas, Sujoy Sinha Roy

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

The isogeny-based post-quantum digital signature algorithm SQIsign offers the most compact key and signature sizes among all candidates in the ongoing NIST call for additional post-quantum signature algorithms. To the best of our knowledge, we present the first Simple Power Analysis (SPA) side-channel attack on SQIsign, demonstrating its feasibility for key recovery.
Our attack specifically targets secret-dependent computations within Cornacchia's algorithm, a fundamental component of SQIsign's quaternion module. At the core of this algorithm, a secret-derived yet ephemeral exponent is used in a modular exponentiation subroutine. By performing SPA on the modular exponentiation, we successfully recover this ephemeral exponent. We then develop a method to show how this leaked exponent can be exploited to ultimately reconstruct the secret signing key of SQIsign.
Our findings emphasize the critical need for side-channel-resistant implementations of SQIsign, highlighting previously unexplored vulnerabilities in its design.
Originalspracheenglisch
TitelAfricacrypt 2025
PublikationsstatusAngenommen/In Druck - 2025
Veranstaltung16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025 - Rabat, Marokko
Dauer: 21 Juli 202523 Juli 2025

Konferenz

Konferenz16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025
KurztitelAFRICACRYPT 2025
Land/GebietMarokko
OrtRabat
Zeitraum21/07/2523/07/25

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Untersuchen Sie die Forschungsthemen von „Simple Power Analysis Attack on SQIsign“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren