One Time is Enough: Chosen-Ciphertext Side-Channel Attack on ML-KEM Cryptosystems

  • Yuhan Qian
  • , Jing Gao
  • , Yuchen Zhong
  • , Yaoling Ding*
  • , Jingjie Wu*
  • , Weiping Gong
  • , Zihe Lin
  • , An Wang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The emergence of quantum computers threatens traditional public key cryptographic algorithms like RSA and ECDSA, driving the development of post-quantum cryptography. Among post-quantum cryptography approaches, lattice-based cryptography is a key candidate for securing embedded systems. However, post-quantum cryptography implementations remain vulnerable to side-channel attacks, which exploit physical leakages such as timing, power, and electromagnetic emissions. In this paper, we propose a one-time chosen-ciphertext simple power attack targeting ML-KEM-512 scheme. Leveraging side-channel leakages from the inverse number theoretic transform operation and the decoding process, our method enables efficient recovery of the long-term secret key with AI algorithms for automated feature extraction and classification, eliminating the need for template construction or extensive parameter tuning. We introduce an adaptive classification method for ring- or sphere-shaped data distributions, enhancing adaptability and reducing parameter dependency. Experimental results on the reference ML-KEM implementation in the pqm4 library demonstrate that, compared to previous approaches, our method reduces the number of traces needed for key recovery by 66.67%. This significant reduction improves both the efficiency and practicality of the method in real-world applications.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops
Subtitle of host publicationAIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Revised Selected Papers
EditorsMark Manulis
PublisherSpringer Science and Business Media Deutschland GmbH
Pages23-40
Number of pages18
ISBN (Print)9783032018052
DOIs
Publication statusPublished - 2026
EventSatellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025 - Munich, Germany
Duration: 23 Jun 202526 Jun 2025

Publication series

NameLecture Notes in Computer Science
Volume15654 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceSatellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025
Country/TerritoryGermany
CityMunich
Period23/06/2526/06/25

Keywords

  • Chosen-ciphertext attack
  • Key encapsulation mechanism
  • Lattice-based cryptography
  • Post-quantum cryptography
  • Public-key encryption
  • Side-channel attack

Fingerprint

Dive into the research topics of 'One Time is Enough: Chosen-Ciphertext Side-Channel Attack on ML-KEM Cryptosystems'. Together they form a unique fingerprint.

Cite this