Cargando…

Online Template Attack on ECDSA:: Extracting Keys via the Other Side

We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same...

Descripción completa

Detalles Bibliográficos
Autores principales: Roelofs, Niels, Samwel, Niels, Batina, Lejla, Daemen, Joan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334982/
http://dx.doi.org/10.1007/978-3-030-51938-4_16
Descripción
Sumario:We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same device. The attack can be prevented by randomization of the (projective) coordinates of the base point.