Enhanced Template Attack Against Dilithium: Leveraging Dual-Loss Feature Extraction

  • Haojin Zhang
  • , Qingjun Yuan*
  • , Yaoling Ding
  • , An Wang
  • , Hailong Zhang
  • , Haopeng Fan
  • , Siqi Lu
  • , Yongjuan Wang*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

As a post-quantum digital signature scheme, Dilithium was specifically designed to withstand known quantum algorithm attacks, and its side-channel resistance has garnered significant research attention. However, current side-channel attacks against Dilithium exhibit several limitations: (1) failure to leverage low-correlation characteristics in power traces, (2) loss functions limited to categorical information extraction from power traces, (3) dependency on specific coefficient recovery conditions while neglecting inter-coefficient statistical dependencies, (4) requirement for separate profiling models per intermediate value, resulting in substantial information loss. To address these limitations, we propose an enhanced template attack framework integrating deep learning with classical template attack methodology. Our approach employs a dualloss similarity learning mechanism for feature extraction from high-dimensional power traces, enabling the construction of more discriminative templates while preserving weakly correlated features. Through assembly-level analysis of the y polynomial generation routine, we reveal inherent correlations among coefficients yk0 , yk1 , yk2 , yk3 . Building on this discovery, our dual-loss similarity learning framework is designed to capture these intercoefficient relationships, preserving their intrinsic dependencies while achieving effective inter-class separation and intra-class aggregation properties, which significantly enhances the effectiveness of subsequent template attacks. Experimental results on Cortex-M4 power traces demonstrate our method achieves 32.94% polynomial coefficient recovery accuracy for polynomial coefficients y, outperforming conventional SOD-based (83% improvement), T-Test-based (97%), and PCA-based template attacks (197% enhancement). Furthermore, complete private key recovery is achieved with merely 14 power traces under specific conditions. This DL-enhanced template attack framework demonstrates superior side-channel leakage exploitation, yielding substantial performance enhancements over conventional approaches.

Original languageEnglish
JournalIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
DOIs
Publication statusAccepted/In press - 2025
Externally publishedYes

Keywords

  • Deep Learning
  • Dilithium Algorithm
  • Feature Extraction
  • Post-Quantum Cryptography
  • Template Attack

Fingerprint

Dive into the research topics of 'Enhanced Template Attack Against Dilithium: Leveraging Dual-Loss Feature Extraction'. Together they form a unique fingerprint.

Cite this