Side Channel Analysis in Homomorphic Encryption
By: Baraq Ghaleb, William J Buchanan
Potential Business Impact:
Protects secret computer information from being spied on.
Homomorphic encryption provides many opportunities for privacy-aware processing, including with methods related to machine learning. Many of our existing cryptographic methods have been shown in the past to be susceptible to side channel attacks. With these, the implementation of the cryptographic methods can reveal information about the private keys used, the result, or even the original plaintext. An example of this includes the processing of the RSA exponent using the Montgomery method, and where 0's and 1's differ in their processing time for modular exponentiation. With FHE, we typically use lattice methods, and which can have particular problems in their implementation in relation to side channel leakage. This paper aims to outline a range of weaknesses within FHE implementations as related to side channel analysis. It outlines a categorization for side-channel analysis, some case studies, and mitigation strategies.
Similar Papers
Reliability Analysis of Fully Homomorphic Encryption Systems Under Memory Faults
Cryptography and Security
Keeps secret computer math safe from mistakes.
Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption
Cryptography and Security
Keeps private data safe during computer learning.
Measuring Computational Universality of Fully Homomorphic Encryption
Cryptography and Security
Lets computers do math on secret information.