Side-channel secure cipher comparison for ML-KEM hardware
Motivation & Goals:
ML-KEM (formerly Kyber) is one of the new, standardised algorithms of post-quantum cryptography. As part of the decapsulation phase, it is checked at the end whether the reconstructed ciphertext matches the received one - a security-critical step that is vulnerable to side-channel attacks (e.g. timing or power analysis) if not implemented properly.
The aim of this work is to design specialised hardware gadgets that can perform this comparison efficiently and side-channel resistant. The focus is on a constant-time, tamper-resistant design and optional support through formal verification.
Tasks:
- Analyse the ciphertext comparison process in ML-KEM and identify potential side-channel leaks.
- Design and implementation of hardware gadgets for secure comparisons (e.g. masking, hiding).
- Implementation and simulation of a prototype at register transfer level (in Verilog).
- Application of formal verification tools to protect against side-channel attacks and functional errors.
Prerequisites:
- Basic knowledge of digital hardware design (Verilog/VHDL) and cryptography is desirable.
- Interest in security, formal methods and embedded systems.
Contact:
If you are interested or have any questions, please contact: michael.hutter@unibw.de