Abstract
This work presents an enhanced two-step Correlation Power Analysis (CPA) attack targeting the recently standardised ML-KEM on an ARM Cortex M4. Our enhancement exploits the knowledge of intermittent variables to identify sample points of interest and develop bespoke attack functions. Step one targets the odd coefficients of each Secret Key Polynomial Vector ( ˆ s), before step two targets the remaining even coefficients using more elaborate attack functions. After successfully demonstrating key recovery for the first set of ˆ s, we then characterise leakage behaviour, revealing a trend indicating recovery of each coefficient becomes more efficient with subsequent iterations of the internal doublebasemul operation. By applying our enhanced two step attack methodology, we successfully recovered the entire key using only 179 traces, without the need for elaborate preconditions or ciphertext manipulations. We obtain remarkable results in the initial stage of our attack, while the second phase achieves performance comparable to other recent studies.
Original language | English |
---|---|
Title of host publication | Proceedings of the 22nd International Conference on Security and Cryptography |
Editors | Sabrina De Capitani Di Vimercati , Pierangela Samarati |
Publisher | SciTePress |
Pages | 263 - 274 |
ISBN (Electronic) | 9789897587603 |
DOIs | |
Publication status | Published - 13 Jun 2025 |
Event | SECRYPT 2025 - Bilbao Duration: 11 Jun 2025 → 13 Jun 2025 https://secrypt.scitevents.org/ |
Publication series
Name | Proceedings of the International Conference on Security and Cryptography |
---|---|
ISSN (Electronic) | 2184-7711 |
Conference
Conference | SECRYPT 2025 |
---|---|
City | Bilbao |
Period | 11/06/2025 → 13/06/2025 |
Internet address |