Cargando…

Online Template Attack on ECDSA:: Extracting Keys via the Other Side

We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same...

Descripción completa

Detalles Bibliográficos
Autores principales: Roelofs, Niels, Samwel, Niels, Batina, Lejla, Daemen, Joan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334982/
http://dx.doi.org/10.1007/978-3-030-51938-4_16
_version_ 1783554044485173248
author Roelofs, Niels
Samwel, Niels
Batina, Lejla
Daemen, Joan
author_facet Roelofs, Niels
Samwel, Niels
Batina, Lejla
Daemen, Joan
author_sort Roelofs, Niels
collection PubMed
description We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same device. The attack can be prevented by randomization of the (projective) coordinates of the base point.
format Online
Article
Text
id pubmed-7334982
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73349822020-07-06 Online Template Attack on ECDSA:: Extracting Keys via the Other Side Roelofs, Niels Samwel, Niels Batina, Lejla Daemen, Joan Progress in Cryptology - AFRICACRYPT 2020 Article We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same device. The attack can be prevented by randomization of the (projective) coordinates of the base point. 2020-06-06 /pmc/articles/PMC7334982/ http://dx.doi.org/10.1007/978-3-030-51938-4_16 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Roelofs, Niels
Samwel, Niels
Batina, Lejla
Daemen, Joan
Online Template Attack on ECDSA:: Extracting Keys via the Other Side
title Online Template Attack on ECDSA:: Extracting Keys via the Other Side
title_full Online Template Attack on ECDSA:: Extracting Keys via the Other Side
title_fullStr Online Template Attack on ECDSA:: Extracting Keys via the Other Side
title_full_unstemmed Online Template Attack on ECDSA:: Extracting Keys via the Other Side
title_short Online Template Attack on ECDSA:: Extracting Keys via the Other Side
title_sort online template attack on ecdsa:: extracting keys via the other side
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334982/
http://dx.doi.org/10.1007/978-3-030-51938-4_16
work_keys_str_mv AT roelofsniels onlinetemplateattackonecdsaextractingkeysviatheotherside
AT samwelniels onlinetemplateattackonecdsaextractingkeysviatheotherside
AT batinalejla onlinetemplateattackonecdsaextractingkeysviatheotherside
AT daemenjoan onlinetemplateattackonecdsaextractingkeysviatheotherside