What a lovely hat

Is it made out of tin foil?

Paper 2025/582

Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on the ML-DSA Cryptosystem

Zheng Liu, Beijing Institute of Technology
An Wang, Beijing Institute of Technology
Congming Wei, Communication University of China
Yaoling Ding, Beijing Institute of Technology
Jingqi Zhang, Beijing Institute of Technology
Annyu Liu, Beijing Institute of Technology
Liehuang Zhu, Beijing Institute of Technology
Abstract

The module-lattice-based digital signature standard, formerly known as CRYSTALS-DILITHIUM, is a lattice-based post-quantum cryptographic scheme. In August 2024, the National Institute of Standards and Technology officially standardized ML-DSA under FIPS 204. ML-DSA generates one valid signature and multiple rejected signatures during a single signing process. Most side-channel attacks targeting ML-DSA have focused solely on the valid signature, while largely neglecting the hints contained in rejected signatures. Building on prior SASCA frameworks originally proposed for ML-DSA, in this paper we present an efficient and fully practical instantiation of a private-key recovery attack on ML-DSA that jointly exploits side-channel leakages from both valid and rejected signatures within a unified factor graph. This concrete instantiation maximizes the information extracted from a single signing attempt and minimizes the number of required traces for full key recovery. We conducted a proof-of-concept experiment with both reference and ASM-optimized implementations on a Cortex-M4 core chip, where the results demonstrate that incorporating rejected signatures reduces the required number of traces by at least $50.0\%$ for full key recovery. Moreover, we show that using only rejected signatures suffices to recover the key with fewer than $30$ traces under our setup. Our findings highlight that protecting rejected signatures is crucial, as their leakage provides valuable side-channel information. We strongly recommend implementing countermeasures for rejected signatures during the signing process to mitigate potential threats.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
DilithiumML-DSASide-Channel Attacksrejected signaturesBelief Propagation
Contact author(s)
lzz73092 @ gmail com
wangan @ bit edu cn
cmwei @ cuc edu cn
dy119 @ bit edu cn
zhangjq @ bit edu cn
annvliu @ bit edu cn
liehuangz @ bit edu cn
History
2025-12-15: last of 2 revisions
2025-03-31: received
See all versions
Short URL
https://ia.cr/2025/582
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/582,
      author = {Zheng Liu and An Wang and Congming Wei and Yaoling Ding and Jingqi Zhang and Annyu Liu and Liehuang Zhu},
      title = {Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on the {ML}-{DSA} Cryptosystem},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/582},
      year = {2025},
      url = {https://eprint.iacr.org/2025/582}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.