skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Study Identifies Vulnerabilities in MPC-in-the-Head Framework

Study Identifies Vulnerabilities in MPC-in-the-Head Framework

/ 3 min read

Quick take - Researchers in France have identified significant vulnerabilities in the MPC-in-the-Head framework through a novel single trace side-channel attack, demonstrating the need for enhanced countermeasures in cryptographic systems currently under evaluation by NIST.

Fast Facts

  • Researchers from France have identified significant vulnerabilities in the MPC-in-the-Head (MPCitH) framework, crucial for digital signature schemes under NIST evaluation.
  • The study introduces a novel single trace side-channel attack, termed Soft Analytical Side-Channel Attack (SASCA), which exploits leakage from multiplication functions in Galois fields.
  • Successful real-world testing on the STM32F407 microcontroller demonstrated the ability to recover secret keys across all security levels, even in noisy environments.
  • The paper proposes various shuffling countermeasures, with full shuffling proving most effective in enhancing protection against attacks.
  • The findings underscore the urgent need for robust countermeasures in cryptographic implementations, especially as the field moves towards post-quantum cryptography.

Single Trace Side-Channel Attack on the MPC-in-the-Head Framework

Researchers from various institutions in France have published a paper titled “Single Trace Side-Channel Attack on the MPC-in-the-Head Framework.” The paper presents a groundbreaking analysis of vulnerabilities in the MPC-in-the-Head (MPCitH) framework, which relies on threshold secret sharing and is widely used in several digital signature schemes. These schemes are currently being evaluated in the second round of the National Institute of Standards and Technology (NIST) call for digital signatures.

Vulnerabilities in the MPCitH Framework

The study marks the first instance of a single trace side-channel attack targeting the MPCitH framework, revealing a significant vulnerability within it. The researchers demonstrated the exploitation of this vulnerability on the SDitH algorithm, which is also part of the NIST call. The attack specifically targets leakage from a multiplication function within the Galois field, enabling attackers to predict intermediate values during the cryptographic process. The method is characterized as a Soft Analytical Side-Channel Attack (SASCA) and employs Belief Propagation (BP) to reconstruct the secret key from minimal observations.

Simulations of the attack were conducted using the Hamming Weight (HW) leakage model, evaluating the resistance of the MPCitH scheme against such attacks. Real-world testing on the STM32F407 microcontroller resulted in the successful recovery of the secret key across all security levels.

Proposed Countermeasures

The researchers propose various shuffling countermeasures to mitigate the identified vulnerabilities, including fine shuffling, coarse shuffling, and full shuffling. Full shuffling demonstrated the most effectiveness in enhancing protection against potential attacks, while other countermeasures were found to be insufficient in providing adequate defense. The study highlights the resilience of the attack against varying levels of noise, indicating that even with higher noise, successful secret recovery remained achievable. This finding underscores the critical need to address physical implementation vulnerabilities within cryptographic systems.

The field is progressing towards post-quantum cryptography, making this issue particularly pressing. The MPCitH framework has been in use since 2007, with practical implementations seen since 2016. The identified vulnerabilities pose a potential threat to several cryptographic schemes under consideration for standardization by NIST.

Future Directions

The paper emphasizes the necessity for robust countermeasures throughout all stages of cryptographic protocol implementation and calls for a reevaluation of side-channel resilience in the cryptographic schemes under review. Future research directions will focus on adapting the attack methodology to newer versions of the MPCitH framework and exploring multi-trace attack scenarios. The findings highlight the ongoing challenge of balancing advancements in cryptographic development with the emergence of new attack methodologies, emphasizing that continuous vigilance in the field of cryptography is crucial.

Original Source: Read the Full Article Here

Check out what's latest