Date of Graduation

5-2023

Document Type

Thesis

Degree Name

Bachelor of Science

Degree Level

Undergraduate

Department

Computer Science and Computer Engineering

Advisor/Mentor

Nelson, Alexander

Committee Member/Reader

Andrews, David

Committee Member/Second Reader

Huang, Mioaqing

Abstract

Post-quantum cryptography is a necessary countermeasure to protect against attacks from quantum computer. However, the post-quantum cryptography schemes are potentially vulnerable to side channel attacks. One such method of attacking involves creating bit-flips in victim memory through a process called Rowhammer. These attacks can vary in nature, but can involve rowhammering bits to raise the encryption scheme's decryption failure rate, or modifying the scheme's random seed. With a high enough decryption failure rate, it becomes feasible to generate sufficient information about the secret key to perform a key recovery attack. This thesis proposed two attacks on proposed post-quantum cryptography algorithms, namely Kyber and BIKE. This process involves profiling the memory to determine which bits can be flipped, massaging a victim page into the correct spot in physical memory, and degrading the cores so that our attack timing coincides with the refreshing of the system's DRAM. The thesis demonstrates both of these attacks in simulation, and further work will execute these attacks on real hardware.

Keywords

Side-Channel; Rowhammer; BIKE; Kyber; CRYSTALS-Kyber

Share

COinS