An enhanced two-step CPA Side-channel analysis attack on ML-KEM

Mark Kennaway, Anh-Tuan Hoang*, Ayesha Khalid*, Ciara Rafferty, Maire O'Neill

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Downloads (Pure)

Abstract

This work presents an enhanced two-step Correlation Power Analysis (CPA) attack targeting the recently standardised ML-KEM on an ARM Cortex M4. Our enhancement exploits the knowledge of intermittent variables to identify sample points of interest and develop bespoke attack functions. Step one targets the odd coefficients of each Secret Key Polynomial Vector ( ˆ s), before step two targets the remaining even coefficients using more elaborate attack functions. After successfully demonstrating key recovery for the first set of ˆ s, we then characterise leakage behaviour, revealing a trend indicating recovery of each coefficient becomes more efficient with subsequent iterations of the internal doublebasemul operation. By applying our enhanced two step attack methodology, we successfully recovered the entire key using only 179 traces, without the need for elaborate preconditions or ciphertext manipulations. We obtain remarkable results in the initial stage of our attack, while the second phase achieves performance comparable to other recent studies.
Original languageEnglish
Title of host publicationProceedings of the 22nd International Conference on Security and Cryptography
EditorsSabrina De Capitani Di Vimercati , Pierangela Samarati
PublisherSciTePress
Pages263 - 274
ISBN (Electronic)9789897587603
DOIs
Publication statusPublished - 13 Jun 2025
EventSECRYPT 2025 - Bilbao
Duration: 11 Jun 202513 Jun 2025
https://secrypt.scitevents.org/

Publication series

NameProceedings of the International Conference on Security and Cryptography
ISSN (Electronic)2184-7711

Conference

ConferenceSECRYPT 2025
CityBilbao
Period11/06/202513/06/2025
Internet address

Fingerprint

Dive into the research topics of 'An enhanced two-step CPA Side-channel analysis attack on ML-KEM'. Together they form a unique fingerprint.

Cite this