Projects per year
Abstract
The isogeny-based post-quantum digital signature algorithm SQIsign offers the most compact key and signature sizes among all candidates in the ongoing NIST call for additional post-quantum signature algorithms. To the best of our knowledge, we present the first Simple Power Analysis (SPA) side-channel attack on SQIsign, demonstrating its feasibility for key recovery.
Our attack specifically targets secret-dependent computations within Cornacchia's algorithm, a fundamental component of SQIsign's quaternion module. At the core of this algorithm, a secret-derived yet ephemeral exponent is used in a modular exponentiation subroutine. By performing SPA on the modular exponentiation, we successfully recover this ephemeral exponent. We then develop a method to show how this leaked exponent can be exploited to ultimately reconstruct the secret signing key of SQIsign.
Our findings emphasize the critical need for side-channel-resistant implementations of SQIsign, highlighting previously unexplored vulnerabilities in its design.
Our attack specifically targets secret-dependent computations within Cornacchia's algorithm, a fundamental component of SQIsign's quaternion module. At the core of this algorithm, a secret-derived yet ephemeral exponent is used in a modular exponentiation subroutine. By performing SPA on the modular exponentiation, we successfully recover this ephemeral exponent. We then develop a method to show how this leaked exponent can be exploited to ultimately reconstruct the secret signing key of SQIsign.
Our findings emphasize the critical need for side-channel-resistant implementations of SQIsign, highlighting previously unexplored vulnerabilities in its design.
| Original language | English |
|---|---|
| Title of host publication | Progress in Cryptology - AFRICACRYPT 2025 |
| Subtitle of host publication | 16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21–23, 2025, Proceedings |
| Editors | Abderrahmane Nitaj, Svetla Petkova-Nikova, Vincent Rijmen |
| Pages | 245–269 |
| Number of pages | 25 |
| ISBN (Electronic) | 978-3-031-97260-7 |
| DOIs | |
| Publication status | Published - 2 Jul 2025 |
| Event | 16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025 - Rabat, Morocco Duration: 21 Jul 2025 → 23 Jul 2025 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 15651 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025 |
|---|---|
| Abbreviated title | AFRICACRYPT 2025 |
| Country/Territory | Morocco |
| City | Rabat |
| Period | 21/07/25 → 23/07/25 |
Keywords
- Isogeny
- PQC
- Side-Channel Analysis
- SQIsign
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Dive into the research topics of 'Simple Power Analysis Attack on SQIsign'. Together they form a unique fingerprint.Projects
- 1 Active
-
FWF - ISOCrystals - Secure and Efficient Isogeny-based Cryptography in Hardware
Sinha Roy, S. (Project manager on research unit)
3/06/24 → 2/12/27
Project: Research project
Activities
- 1 Talk at conference or symposium
-
Simple Power Analysis Attack on SQIsign
Mukherjee, A. (Speaker)
23 Jul 2025Activity: Talk or presentation › Talk at conference or symposium › Science to science