RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library

PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022)(2022)

引用 11|浏览18
暂无评分
摘要
This paper demonstrates the first side-channel attack on homomorphic encryption (HE), which allows computing on encrypted data. We reveal a power-based side-channel leakage of Microsoft SEAL prior to v3.6 that implements the Brakerski/FanVercauteren (BFV) protocol. Our proposed attack targets the Gaussian sampling in the SEAL's encryption phase and can extract the entire message with a single power measurement. Our attack works by (1) identifying each coefficient index being sampled, (2) extracting the sign value of the coefficients from control-flow variations, (3) recovering the coefficients with a high probability from data-flow variations, and (4) using a Blockwise Korkine-Zolotarev (BKZ) algorithm to efficiently explore and estimate the remaining search space. Using real power measurements, the results on a RISC-V FPGA implementation of the SEAL (v3.2) show that the proposed attack can reduce the plaintext encryption security level from 2128 to 24.4. Therefore, as HE gears toward real-world applications, such attacks and related defenses should be considered.
更多
查看译文
关键词
single-trace side-channel leakage,SEAL homomorphic encryption library,side-channel attack,power-based side-channel leakage,Microsoft SEAL,Gaussian sampling,single power measurement,coefficient index,control-flow variations,data-flow variations,blockwise Korkine-Zolotarev algorithm,power measurements,RISC-V FPGA implementation,plaintext encryption security level,BKZ algorithm,BFV protocol,Brakerski-Fan-Vercauteren protocol
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要