skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Study Examines Vulnerabilities in MAYO Digital Signature Scheme

Study Examines Vulnerabilities in MAYO Digital Signature Scheme

/ 3 min read

Quick take - A recent study has revealed significant vulnerabilities in the MAYO digital signature scheme, a quantum-resistant cryptographic algorithm, to single-trace side-channel attacks, highlighting the need for robust countermeasures and secure implementations to protect against potential exploitation in critical infrastructure sectors.

Fast Facts

  • A study revealed vulnerabilities in the MAYO digital signature scheme, a quantum-resistant cryptographic algorithm, to single-trace side-channel attacks using deep learning techniques.
  • Two attacks demonstrated high secret key recovery probabilities of 99.9% and 91.6% by analyzing power traces during modular multiplication on an ARM Cortex-M4 processor.
  • Significant power leakage was identified in the MAYO implementation, necessitating robust countermeasures such as parallel processing, masking, and algorithm optimization to minimize leakage.
  • The research highlights the gap between theoretical security and practical implementation vulnerabilities, stressing the need for rigorous testing and certification of cryptographic systems.
  • Findings may influence NIST’s standardization process for post-quantum cryptography, emphasizing the importance of secure-by-design principles and hardware-level protections.

Study Investigates Vulnerabilities in MAYO Digital Signature Scheme

A recent study has investigated the vulnerabilities of the MAYO digital signature scheme to single-trace side-channel attacks. MAYO is a quantum-resistant cryptographic algorithm characterized by its small key and signature sizes, making it a suitable choice for resource-constrained platforms, including embedded systems and Internet of Things (IoT) devices.

Single-Trace Side-Channel Attacks

Researchers demonstrated two single-trace side-channel attacks using deep learning techniques, focusing on power analysis during modular multiplication to recover secret keys. The first attack achieved a secret key recovery probability of 99.9%, while the second attack achieved a recovery probability of 91.6%. Neural network models were used to analyze power traces captured during experiments on an ARM Cortex-M4 processor, utilizing a ChipWhisperer-Husky for power trace capture. Significant power leakage was noted during modular multiplications in the MAYO implementation, which was optimized by Beullens. This leakage allowed for the recovery of oil space vectors that can be expanded into full secret keys.

Countermeasures and Recommendations

To enhance the success rates of these attacks, trace preprocessing and neural network architectures were optimized. Proposed countermeasures include techniques such as parallel processing, masking, and shuffling, along with algorithm optimization aimed at minimizing leakage. Recommendations were made to modify critical procedures, including substituting odd power multiplications with even power ones. The findings underscore critical vulnerabilities in current post-quantum cryptography (PQC) implementations, highlighting the necessity for robust countermeasures before widespread deployment, especially in critical infrastructure sectors like healthcare and finance.

Implications for Cryptography

The study emphasizes the distinction between theoretical security and practical implementation vulnerabilities, calling for rigorous testing and certification of cryptographic implementations, particularly regarding physical security. It raises awareness among developers and organizations about the need to consider side-channel resilience alongside mathematical robustness. The research suggests that nation-states with advanced capabilities could exploit these vulnerabilities, impacting secure communications. The critical takeaway is that cybersecurity must secure both the algorithms and their implementations to prevent exposure to advanced attacks. Future work is encouraged in developing hardware-level protections and improving cryptographic implementations, reinforcing the importance of secure-by-design principles in cryptography. The implications of this research may influence the National Institute of Standards and Technology’s (NIST) standardization process, including the evaluation of PQC algorithms.

Original Source: Read the Full Article Here

Check out what's latest