Paper 2025/2163
Correction-Based Fault Attack Against Randomized MAYO
Abstract
This paper introduces a novel fault injection attack targeting the randomized version of the MAYO post-quantum signature scheme. While prior attacks on MAYO either relied on deterministic signing modes or specific memory assumptions, our attack succeeds without such constraints. By exploiting the inherent structural properties of MAYO signatures, we combine targeted fault injections with signature correction techniques to extract partial information about the secret oil space. By systematically accumulating such partial information across multiple fault-induced signatures and utilizing linear dependencies among oil vectors, we present an efficient method for achieving full secret key recovery. The attack requires only one fault injection per oil coefficient, repeated a small (i.e., 8,17,10, or 12 for the different MAYO versions, respectively) number of times. We demonstrate the targeted fault injection attack on a MAYO implementation on an ARM Cortex-M4 processor via clock glitching, establishing the feasibility of the attack in practice. Our approach is validated through simulations, and a detailed computational cost analysis is provided. Additionally, we demonstrate the ineffectiveness of some previously proposed countermeasures against our attack, thereby highlighting the urgent need for developing more robust protection mechanisms for multivariate post-quantum signature schemes, such as MAYO.
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Fault injection attackMAYOMultivariate cryptographyPost-Quantum cryptography
- Contact author(s)
-
mohameda @ simula no
lejla batina @ ru nl
durba chatterjee @ ru nl
haavardr @ simula no - History
- 2026-01-16: revised
- 2025-11-28: received
- See all versions
- Short URL
- https://ia.cr/2025/2163
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/2163,
author = {Mohamed Abdelmonem and Lejla Batina and Durba Chatterjee and Håvard Raddum},
title = {Correction-Based Fault Attack Against Randomized {MAYO}},
howpublished = {Cryptology {ePrint} Archive, Paper 2025/2163},
year = {2025},
url = {https://eprint.iacr.org/2025/2163}
}