25th Design, Automation and Test in Europe Conference and Exhibition (DATE), ELECTR NETWORK, 14 - 23 Mart 2022, ss.1527-1532
This paper demonstrates the first side-channel attack on homomorphic encryption (HE), which allows computing on encrypted data. We reveal a power-based side-channel leakage of Microsoft SEAL prior to v3.6 that implements the Brakerski/FanVercauteren (BFV) protocol. Our proposed attack targets the Gaussian sampling in the SEAL's encryption phase and can extract the entire message with a single power measurement.