REAL

Simple Power Analysis Attack on SQIsign

Mukherjee, Anisha and Czuprynko, Maciej and Jacquemin, David and Kutas, Péter and Roy, Sujoy Sinha (2026) Simple Power Analysis Attack on SQIsign. LECTURE NOTES IN COMPUTER SCIENCE, 15651. pp. 245-269. ISSN 0302-9743

[img] Text
2025-830.pdf - Published Version
Restricted to Registered users only

Download (857kB) | Request a copy

Abstract

The isogeny-based post-quantum digital signature algorithm SQIsign offers the most compact key and signature sizes among all candidates in the ongoing NIST call for additional post-quantum signature algorithms. To the best of our knowledge, we present the first Simple Power Analysis (SPA) side-channel attack on SQIsign, demonstrating its feasibility for key recovery. Our attack specifically targets secret-dependent computations within Cornacchia’s algorithm, a fundamental component of SQIsign’s quaternion module. At the core of this algorithm, a secretderived yet ephemeral exponent is used in a modular exponentiation subroutine. By performing SPA on the modular exponentiation, we successfully recover this ephemeral exponent. We then develop a method to show how this leaked exponent can be exploited to ultimately reconstruct the secret signing key of SQIsign. Our findings emphasize the critical need for side-channel-resistant implementations of SQIsign, highlighting previously unexplored vulnerabilities in its design.

Item Type: Article
Uncontrolled Keywords: Isogeny · SQIsign · Side-Channel Analysis · PQC
Subjects: Q Science / természettudomány > QA Mathematics / matematika > QA75 Electronic computers. Computer science / számítástechnika, számítógéptudomány
SWORD Depositor: MTMT SWORD
Depositing User: MTMT SWORD
Date Deposited: 19 Sep 2025 21:12
Last Modified: 22 Sep 2025 06:19
URI: https://real.mtak.hu/id/eprint/224647

Actions (login required)

Edit Item Edit Item