Prasanna Ravi

ORCID: 0000-0003-0201-3705
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Coding theory and cryptography
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Cryptography and Residue Arithmetic
  • Embedded Systems Design Techniques
  • Interconnection Networks and Systems
  • Radiation Effects in Electronics
  • Quantum Computing Algorithms and Architecture
  • Cloud Data Security Solutions
  • Network Packet Processing and Optimization
  • Medical Imaging Techniques and Applications
  • Advanced Memory and Neural Computing
  • Polynomial and algebraic computation
  • Quantum-Dot Cellular Automata
  • Advanced Authentication Protocols Security
  • Architecture and Computational Design
  • Nuclear Materials and Properties
  • Geophysics and Sensor Technology
  • Caching and Content Delivery
  • Electronic and Structural Properties of Oxides
  • Peer-to-Peer Network Technologies

Nanyang Technological University
2018-2024

Centre for Development of Telematics
2016

National Institute of Technology Tiruchirappalli
2014

In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) Encapsulation Mechanisms (KEM) secure in the model (IND-CCA security). We show that information can be efficiently utilized to instantiate a plaintext checking oracle, which provides binary about output of decryption, typically concealed within IND-CCA PKE/KEMs, thereby enabling our attacks. Firstly, identified EM-based vulnerabilities...

10.46586/tches.v2020.i3.307-335 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2020-06-19

In this work, we present a systematic study of Side-Channel Attacks (SCA) and Fault Injection (FIA) on structured lattice-based schemes, with main focus Kyber Key Encapsulation Mechanism (KEM) Dilithium signature scheme, which are leading candidates in the NIST standardization process for Post-Quantum Cryptography (PQC). Through our study, attempt to understand underlying similarities differences between existing attacks while classifying them into different categories. Given wide variety...

10.1145/3603170 article EN other-oa ACM Transactions on Embedded Computing Systems 2023-06-05

In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These operate in a chosen-ciphertext setting, are fairly easy mount on given target, as attacker requires very minimal information about target device. However, these have an inherent disadvantage of requiring few thousand traces perform full key recovery. This is due fact that typically work by recovering single bit secret per query/trace. respect,...

10.46586/tches.v2023.i2.418-446 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2023-03-06

In this work, we propose generic and practical side-channel attacks for message recovery in post-quantum lattice-based public key encryption (PKE) encapsulation mechanisms (KEM). The targeted schemes are based on the well known Learning With Errors (LWE) Rounding (LWR) problem include three finalists six semi-finalist candidates of ongoing NIST's standardization process cryptography. Notably, to exploit inherent <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tifs.2021.3139268 article EN IEEE Transactions on Information Forensics and Security 2021-12-28

In this work, we present the first fault injection analysis of Number Theoretic Transform (NTT). The NTT is an integral computation unit, widely used for polynomial multiplication in several structured lattice-based key encapsulation mechanisms (KEMs) and digital signature schemes. We identify a critical single vulnerability NTT, which severely reduces entropy its output. This turn enables us to perform wide-range attacks applicable KEMs as well particular, demonstrate novel recovery message...

10.46586/tches.v2023.i2.447-481 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2023-03-06

This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM. We demonstrate exploitability both on popular platforms: Raspberry Pi 2 (Arm Cortex-A7) Arm Cortex-M4 microprocessor. secret keys are reliably recovered within minutes for a few hours KyberSlash1. responsibly disclosed these to maintainers various libraries they have...

10.46586/tches.v2025.i2.209-234 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2025-03-04

In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes. particular, extend practicality skip-addition attacks through exploitation determinism in Dilithium and qTESLA schemes, which are two leading candidates for NIST standardization post-quantum cryptography. We show that single targeted faults injected signing procedure allow to recover an important portion secret key. Though do not all key elements, propose a novel forgery...

10.1145/3321705.3329821 article EN 2019-07-02

In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in post-quantum cryptography, some works have developed low-cost detection-based countermeasures. These try detect maliciously generated input ciphertexts and react them by discarding ciphertext or secret key. this work, we take a look at two previously proposed countermeasures: sanity check decapsulation failure check, demonstrate successful on these schemes. We show that first countermeasure...

10.46586/tches.v2024.i2.795-818 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2024-03-12

Ensuring communication security in real-time automotive networks is of paramount importance given the sensitivity exchanged information and highly safety critical nature its operation. The first step towards ensuring to securely authenticate all computational nodes through use authentication protocols based on public-key cryptography. But, traditional cryptographic primitives we today are believed be breakable by large scale quantum computers future. Thus, NIST currently running a global...

10.1109/iscas45731.2020.9180847 article EN 2022 IEEE International Symposium on Circuits and Systems (ISCAS) 2020-09-29

Recent work has shown that Side-Channel Attacks (SCA) and Fault (FA) can be combined, forming an extremely powerful adversarial model, which bypass even some strongest protections against both FA SCA. However, such form of combined attack comes with practical challenges - 1) a profiled setting multiple fault locations is needed; 2) models are restricted to single-bit set-reset/flips; 3) the input needs repeated several times. In this paper, we propose new strategy called SCA-NFA works in...

10.23919/date56975.2023.10137176 article EN Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), 2015 2023-04-01

Digital security practitioners are facing enormous challenge in face of the growing repertoire physical attacks, e.g., Side Channel Attack (SCA) and Fault Injection (FIA). Countermeasures to such threats usually very different nature come with a significant performance penalty. While FIA countermeasures rely on fault-detecting sensors or concurrent error detection schemes, SCA based data masking dual-rail logic circuits. Recently, low-overhead countermeasure has been proposed that utilises...

10.1109/isvlsi.2018.00118 article EN 2018-07-01

In this work, we propose the first hardware implementation of Classic McEliece protected with countermeasures against Side-Channel Attacks (SCA) and Fault Injection (FIA). Mceliece is one leading candidates for Key Encapsulation Mechanisms (KEMs) in ongoing round 4 NIST standardization process post-quantum cryptography. particular, implement a range generic SCA FIA, particularly vulnerable operations such as additive Fast Fourier Transform (FFT) Gaussian elimination, that have been targeted...

10.36227/techrxiv.171925242.26878384/v2 preprint EN 2024-11-06

Elliptic curve cryptography (ECC) is a public key cryptosystem which widely used for different real world applications. With the introduction of side-channel attacks, there growing concern regarding security such implementations. Indeed, attacks have been reported to break even theoretically secure ciphers due exploit in physical leakage. The non-profiled especially are considered more serious than profiled counterpart, as former can work almost black box setting. Several proposed, however,...

10.1109/icdsp.2018.8631824 article EN 2018-11-01
Coming Soon ...