Paper 2025/582
Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on the ML-DSA Cryptosystem
Abstract
The module-lattice-based digital signature standard, formerly known as CRYSTALS-DILITHIUM, is a lattice-based post-quantum cryptographic scheme. In August 2024, the National Institute of Standards and Technology officially standardized ML-DSA under FIPS 204. ML-DSA generates one valid signature and multiple rejected signatures during a single signing process. Most side-channel attacks targeting ML-DSA have focused solely on the valid signature, while largely neglecting the hints contained in rejected signatures. Building on prior SASCA frameworks originally proposed for ML-DSA, in this paper we present an efficient and fully practical instantiation of a private-key recovery attack on ML-DSA that jointly exploits side-channel leakages from both valid and rejected signatures within a unified factor graph. This concrete instantiation maximizes the information extracted from a single signing attempt and minimizes the number of required traces for full key recovery. We conducted a proof-of-concept experiment with both reference and ASM-optimized implementations on a Cortex-M4 core chip, where the results demonstrate that incorporating rejected signatures reduces the required number of traces by at least $50.0\%$ for full key recovery. Moreover, we show that using only rejected signatures suffices to recover the key with fewer than $30$ traces under our setup. Our findings highlight that protecting rejected signatures is crucial, as their leakage provides valuable side-channel information. We strongly recommend implementing countermeasures for rejected signatures during the signing process to mitigate potential threats.
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- DilithiumML-DSASide-Channel Attacksrejected signaturesBelief Propagation
- Contact author(s)
-
lzz73092 @ gmail com
wangan @ bit edu cn
cmwei @ cuc edu cn
dy119 @ bit edu cn
zhangjq @ bit edu cn
annvliu @ bit edu cn
liehuangz @ bit edu cn - History
- 2025-12-15: last of 2 revisions
- 2025-03-31: received
- See all versions
- Short URL
- https://ia.cr/2025/582
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/582,
author = {Zheng Liu and An Wang and Congming Wei and Yaoling Ding and Jingqi Zhang and Annyu Liu and Liehuang Zhu},
title = {Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on the {ML}-{DSA} Cryptosystem},
howpublished = {Cryptology {ePrint} Archive, Paper 2025/582},
year = {2025},
url = {https://eprint.iacr.org/2025/582}
}