CryptoDB
Nicolai Kraus
Publications
Year
Venue
Title
2025
PKC
One Bit to Rule Them All - Imperfect Randomness Harms Lattice Signatures
Abstract
The Fiat-Shamir transform is one of the most widely applied methods for secure signature construction. Fiat-Shamir starts with an interactive zero-knowledge identification protocol and transforms this via a hash function into a non-interactive signature. The protocol's zero-knowledge property ensures that a signature does not leak information on its secret key →s, which is achieved by blinding →s via proper randomness~→y.
Most prominent Fiat-Shamir examples are DSA signatures and the new post-quantum standard Dilithium.
In practice, DSA signatures have experienced fatal attacks via leakage of a few bits of the randomness~→y per signature.
Similar attacks now emerge for lattice-based signatures, such as Dilithium.
We build on, improve and generalize the pioneering leakage attack on Dilithium by Liu, Zhou, Sun, Wang, Zhang, and Ming.
{In theory}, their original attack can recover a 256-dimensional subkey of Dilithium-II (aka ML-DSA-44) from leakage in a single bit of →y per signature, in any bit position j≥6.
However, the memory requirement of their attack grows exponentially in the bit position j of the leak.
As a consequence, if the bit leak is in a high-order position, then their attack is infeasible.
In our improved attack, we introduce a novel transformation, that allows us to get rid of the exponential memory requirement.
Thereby, we make the attack feasible for \emph{all} bit positions j≥6.
Furthermore, our novel transformation significantly reduces the number of required signatures in the attack.
The attack applies more generally to all Fiat-Shamir-type lattice-based signatures.
For a signature scheme based on module LWE over an ℓ-dimensional module, the attack uses a 1-bit leak per signature to efficiently recover a 1ℓ-fraction of the secret key.
In the ring LWE setting, which can be seen as module LWE with ℓ=1, the attack thus recovers the whole key.
For Dilithium-II, which uses ℓ=4, knowledge of a 14-fraction of the 1024-dimensional secret key lets its security estimate drop significantly from 128 to 84 bits.
Coauthors
- Simon Damm (1)
- Nicolai Kraus (1)
- Alexander May (1)
- Julian Nowakowski (1)
- Jonas Thietke (1)