TY - GEN
T1 - One Time is Enough
T2 - Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025
AU - Qian, Yuhan
AU - Gao, Jing
AU - Zhong, Yuchen
AU - Ding, Yaoling
AU - Wu, Jingjie
AU - Gong, Weiping
AU - Lin, Zihe
AU - Wang, An
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
PY - 2026
Y1 - 2026
N2 - The emergence of quantum computers threatens traditional public key cryptographic algorithms like RSA and ECDSA, driving the development of post-quantum cryptography. Among post-quantum cryptography approaches, lattice-based cryptography is a key candidate for securing embedded systems. However, post-quantum cryptography implementations remain vulnerable to side-channel attacks, which exploit physical leakages such as timing, power, and electromagnetic emissions. In this paper, we propose a one-time chosen-ciphertext simple power attack targeting ML-KEM-512 scheme. Leveraging side-channel leakages from the inverse number theoretic transform operation and the decoding process, our method enables efficient recovery of the long-term secret key with AI algorithms for automated feature extraction and classification, eliminating the need for template construction or extensive parameter tuning. We introduce an adaptive classification method for ring- or sphere-shaped data distributions, enhancing adaptability and reducing parameter dependency. Experimental results on the reference ML-KEM implementation in the pqm4 library demonstrate that, compared to previous approaches, our method reduces the number of traces needed for key recovery by 66.67%. This significant reduction improves both the efficiency and practicality of the method in real-world applications.
AB - The emergence of quantum computers threatens traditional public key cryptographic algorithms like RSA and ECDSA, driving the development of post-quantum cryptography. Among post-quantum cryptography approaches, lattice-based cryptography is a key candidate for securing embedded systems. However, post-quantum cryptography implementations remain vulnerable to side-channel attacks, which exploit physical leakages such as timing, power, and electromagnetic emissions. In this paper, we propose a one-time chosen-ciphertext simple power attack targeting ML-KEM-512 scheme. Leveraging side-channel leakages from the inverse number theoretic transform operation and the decoding process, our method enables efficient recovery of the long-term secret key with AI algorithms for automated feature extraction and classification, eliminating the need for template construction or extensive parameter tuning. We introduce an adaptive classification method for ring- or sphere-shaped data distributions, enhancing adaptability and reducing parameter dependency. Experimental results on the reference ML-KEM implementation in the pqm4 library demonstrate that, compared to previous approaches, our method reduces the number of traces needed for key recovery by 66.67%. This significant reduction improves both the efficiency and practicality of the method in real-world applications.
KW - Chosen-ciphertext attack
KW - Key encapsulation mechanism
KW - Lattice-based cryptography
KW - Post-quantum cryptography
KW - Public-key encryption
KW - Side-channel attack
UR - https://www.scopus.com/pages/publications/105021005404
U2 - 10.1007/978-3-032-01806-9_2
DO - 10.1007/978-3-032-01806-9_2
M3 - Conference contribution
AN - SCOPUS:105021005404
SN - 9783032018052
T3 - Lecture Notes in Computer Science
SP - 23
EP - 40
BT - Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops
A2 - Manulis, Mark
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 23 June 2025 through 26 June 2025
ER -