跳到主要导航 跳到搜索 跳到主要内容

Enhanced Template Attack Against Dilithium: Leveraging Dual-Loss Feature Extraction

  • Haojin Zhang
  • , Qingjun Yuan*
  • , Yaoling Ding
  • , An Wang
  • , Hailong Zhang
  • , Haopeng Fan
  • , Siqi Lu
  • , Yongjuan Wang*
  • *此作品的通讯作者
  • Henan Key Laboratory of Network Cryptography Technology
  • Ministry of Education in China
  • Xi'an Jiaotong University
  • Beijing Institute of Technology
  • University of Chinese Academy of Sciences

科研成果: 期刊稿件文章同行评审

摘要

As a post-quantum digital signature scheme, Dilithium was specifically designed to withstand known quantum algorithm attacks, and its side-channel resistance has garnered significant research attention. However, current side-channel attacks against Dilithium exhibit several limitations: (1) failure to leverage low-correlation characteristics in power traces, (2) loss functions limited to categorical information extraction from power traces, (3) dependency on specific coefficient recovery conditions while neglecting inter-coefficient statistical dependencies, (4) requirement for separate profiling models per intermediate value, resulting in substantial information loss. To address these limitations, we propose an enhanced template attack framework integrating deep learning with classical template attack methodology. Our approach employs a dualloss similarity learning mechanism for feature extraction from high-dimensional power traces, enabling the construction of more discriminative templates while preserving weakly correlated features. Through assembly-level analysis of the y polynomial generation routine, we reveal inherent correlations among coefficients yk0 , yk1 , yk2 , yk3 . Building on this discovery, our dual-loss similarity learning framework is designed to capture these intercoefficient relationships, preserving their intrinsic dependencies while achieving effective inter-class separation and intra-class aggregation properties, which significantly enhances the effectiveness of subsequent template attacks. Experimental results on Cortex-M4 power traces demonstrate our method achieves 32.94% polynomial coefficient recovery accuracy for polynomial coefficients y, outperforming conventional SOD-based (83% improvement), T-Test-based (97%), and PCA-based template attacks (197% enhancement). Furthermore, complete private key recovery is achieved with merely 14 power traces under specific conditions. This DL-enhanced template attack framework demonstrates superior side-channel leakage exploitation, yielding substantial performance enhancements over conventional approaches.

指纹

探究 'Enhanced Template Attack Against Dilithium: Leveraging Dual-Loss Feature Extraction' 的科研主题。它们共同构成独一无二的指纹。

引用此