Home | Resources | Use cases | Conference 2023 | Discord | Newsletter


Single-Trace Side-Channel Attack on SEAL Homomorphic Encryption Library

by Furkan Aydin - 28.04.2022

Video recording (Youtube) | Slides (Google Drive) | Join the discussion (Discord)

Meetup event cover (2)

Abstract

In this talk, Furkan will talk about the first side-channel attack on homomorphic encryption, which allows computing on encrypted data. The attack targets the Gaussian sampling in the SEAL’s encryption phase and can extract the entire secret message with a single power measurement.

The speaker

Furkan Aydin is pursuing a Ph.D. in Electrical and Computer Engineering at North Carolina State University (NC State) under the guidance of Dr. Aydin Aysu. He is a member of HECTOR - Hardware and Embedded Cyber-Threat Research lab at NC State. His research interests include the areas of side-channel attacks, countermeasures, and implementation of cryptographic algorithms.

Important links