Paper 2025/2163

Correction-Based Fault Attack Against Randomized MAYO

Mohamed Abdelmonem, Simula UiB
Lejla Batina, Radboud University
Durba Chatterjee, Radboud University
Håvard Raddum, Simula UiB
Abstract

This paper introduces a novel fault injection attack targeting the randomized version of the MAYO post-quantum signature scheme. While prior attacks on MAYO either relied on deterministic signing modes or specific memory assumptions, our attack succeeds without such constraints. By exploiting the inherent structural properties of MAYO signatures, we combine targeted fault injections with signature correction techniques to extract partial information about the secret oil space. By systematically accumulating such partial information across multiple fault-induced signatures and utilizing linear dependencies among oil vectors, we present an efficient method for achieving full secret key recovery. The attack requires only one fault injection per oil coefficient, repeated a small (i.e., 8,17,10, or 12 for the different MAYO versions, respectively) number of times. We demonstrate the targeted fault injection attack on a MAYO implementation on an ARM Cortex-M4 processor via clock glitching, establishing the feasibility of the attack in practice. Our approach is validated through simulations, and a detailed computational cost analysis is provided. Additionally, we demonstrate the ineffectiveness of some previously proposed countermeasures against our attack, thereby highlighting the urgent need for developing more robust protection mechanisms for multivariate post-quantum signature schemes, such as MAYO.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Fault injection attackMAYOMultivariate cryptographyPost-Quantum cryptography
Contact author(s)
mohameda @ simula no
lejla batina @ ru nl
durba chatterjee @ ru nl
haavardr @ simula no
History
2026-01-16: revised
2025-11-28: received
See all versions
Short URL
https://ia.cr/2025/2163
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/2163,
      author = {Mohamed Abdelmonem and Lejla Batina and Durba Chatterjee and Håvard Raddum},
      title = {Correction-Based Fault Attack Against Randomized {MAYO}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/2163},
      year = {2025},
      url = {https://eprint.iacr.org/2025/2163}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.