Cargando…
Online Template Attack on ECDSA:: Extracting Keys via the Other Side
We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334982/ http://dx.doi.org/10.1007/978-3-030-51938-4_16 |
_version_ | 1783554044485173248 |
---|---|
author | Roelofs, Niels Samwel, Niels Batina, Lejla Daemen, Joan |
author_facet | Roelofs, Niels Samwel, Niels Batina, Lejla Daemen, Joan |
author_sort | Roelofs, Niels |
collection | PubMed |
description | We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same device. The attack can be prevented by randomization of the (projective) coordinates of the base point. |
format | Online Article Text |
id | pubmed-7334982 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-73349822020-07-06 Online Template Attack on ECDSA:: Extracting Keys via the Other Side Roelofs, Niels Samwel, Niels Batina, Lejla Daemen, Joan Progress in Cryptology - AFRICACRYPT 2020 Article We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same device. The attack can be prevented by randomization of the (projective) coordinates of the base point. 2020-06-06 /pmc/articles/PMC7334982/ http://dx.doi.org/10.1007/978-3-030-51938-4_16 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Roelofs, Niels Samwel, Niels Batina, Lejla Daemen, Joan Online Template Attack on ECDSA:: Extracting Keys via the Other Side |
title | Online Template Attack on ECDSA:: Extracting Keys via the Other Side |
title_full | Online Template Attack on ECDSA:: Extracting Keys via the Other Side |
title_fullStr | Online Template Attack on ECDSA:: Extracting Keys via the Other Side |
title_full_unstemmed | Online Template Attack on ECDSA:: Extracting Keys via the Other Side |
title_short | Online Template Attack on ECDSA:: Extracting Keys via the Other Side |
title_sort | online template attack on ecdsa:: extracting keys via the other side |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334982/ http://dx.doi.org/10.1007/978-3-030-51938-4_16 |
work_keys_str_mv | AT roelofsniels onlinetemplateattackonecdsaextractingkeysviatheotherside AT samwelniels onlinetemplateattackonecdsaextractingkeysviatheotherside AT batinalejla onlinetemplateattackonecdsaextractingkeysviatheotherside AT daemenjoan onlinetemplateattackonecdsaextractingkeysviatheotherside |