Abstract. The post-quantum digital signature scheme CRYSTALS-Dilithium has

been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and other post-quantum cryptography schemes, on embedded devices

raises a new set of challenges, including ones related to performance in terms of speed

and memory requirements, but also related to side-channel and fault injection attacks

security. In this work, we investigated the latter and describe a differential fault attack

on the randomized and deterministic versions of CRYSTALS-Dilithium. Notably, the

attack requires a few instructions skips and is able to reduce the MLWE problem that

Dilithium is based on to a smaller RLWE problem which can be practically solved

with lattice reduction techniques. Accordingly, we demonstrated key recoveries using

hints extracted on the secret keys from the same faulted signatures using the LWE

with side-information framework introduced by Dachman-Soled et al. at CRYPTO’20.

As a final contribution, we proposed algorithmic countermeasures against this attack

and in particular showed that the second one can be parameterized to only induce a

negligible overhead over the signature generation.

Keywords: Post-Quantum Cryptography · Differential Fault Attacks · Dilithium ·

Lattice Reduction