Cache-Timing Attack on the SEAL Homomorphic Encryption Library - 11th International Workshop on Security Proofs for Embedded Systems Access content directly
Conference Papers Year : 2022

Cache-Timing Attack on the SEAL Homomorphic Encryption Library

Abstract

Homomorphic encryption (HE) ensures provable secrecy of data processed in the ciphertext domain. However, it happens that FHE private-key algorithms can be broken by side-channel attacks. We disclose a novel cache-timing attack on the SEAL open-source HE library. It is triggered by a non-constant time Barrett modular multiplication, which is one of the building blocks in SEAL. We both analyze the mathematical conditions upon which the leakage occurs and show the experimental feasibility of the attack.
Fichier principal
Vignette du fichier
6469-CacheTimingAttackSEAL.pdf (646.75 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-03780506 , version 1 (19-09-2022)

Identifiers

  • HAL Id : hal-03780506 , version 1

Cite

Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Fan Huang, Amina Bel Korchi, et al.. Cache-Timing Attack on the SEAL Homomorphic Encryption Library. 11th International Workshop on Security Proofs for Embedded Systems (PROOFS 2022), Sep 2022, Leuven, Belgium. ⟨hal-03780506⟩
267 View
382 Download

Share

Gmail Facebook X LinkedIn More