Cargando…
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this paper, we reinvestigate the construction of the lattice used in one of these methods, the Extended Hi...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334987/ http://dx.doi.org/10.1007/978-3-030-51938-4_18 |
_version_ | 1783554045651189760 |
---|---|
author | De Micheli, Gabrielle Piau, Rémi Pierrot, Cécile |
author_facet | De Micheli, Gabrielle Piau, Rémi Pierrot, Cécile |
author_sort | De Micheli, Gabrielle |
collection | PubMed |
description | Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this paper, we reinvestigate the construction of the lattice used in one of these methods, the Extended Hidden Number Problem (EHNP). We find the secret key with only 3 signatures, thus reaching a known theoretical bound, whereas best previous methods required at least 4 signatures in practice. Given a specific leakage model, our attack is more efficient than previous attacks, and for most cases, has better probability of success. To obtain such results, we perform a detailed analysis of the parameters used in the attack and introduce a preprocessing method which reduces by a factor up to 7 the total time to recover the secret key for some parameters. We perform an error resilience analysis which has never been done before in the setup of EHNP. Our construction find the secret key with a small amount of erroneous traces, up to [Formula: see text] of false digits, and [Formula: see text] with a specific type of error. |
format | Online Article Text |
id | pubmed-7334987 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-73349872020-07-06 A Tale of Three Signatures: Practical Attack of ECDSA with wNAF De Micheli, Gabrielle Piau, Rémi Pierrot, Cécile Progress in Cryptology - AFRICACRYPT 2020 Article Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this paper, we reinvestigate the construction of the lattice used in one of these methods, the Extended Hidden Number Problem (EHNP). We find the secret key with only 3 signatures, thus reaching a known theoretical bound, whereas best previous methods required at least 4 signatures in practice. Given a specific leakage model, our attack is more efficient than previous attacks, and for most cases, has better probability of success. To obtain such results, we perform a detailed analysis of the parameters used in the attack and introduce a preprocessing method which reduces by a factor up to 7 the total time to recover the secret key for some parameters. We perform an error resilience analysis which has never been done before in the setup of EHNP. Our construction find the secret key with a small amount of erroneous traces, up to [Formula: see text] of false digits, and [Formula: see text] with a specific type of error. 2020-06-06 /pmc/articles/PMC7334987/ http://dx.doi.org/10.1007/978-3-030-51938-4_18 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article De Micheli, Gabrielle Piau, Rémi Pierrot, Cécile A Tale of Three Signatures: Practical Attack of ECDSA with wNAF |
title | A Tale of Three Signatures: Practical Attack of ECDSA with wNAF |
title_full | A Tale of Three Signatures: Practical Attack of ECDSA with wNAF |
title_fullStr | A Tale of Three Signatures: Practical Attack of ECDSA with wNAF |
title_full_unstemmed | A Tale of Three Signatures: Practical Attack of ECDSA with wNAF |
title_short | A Tale of Three Signatures: Practical Attack of ECDSA with wNAF |
title_sort | tale of three signatures: practical attack of ecdsa with wnaf |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334987/ http://dx.doi.org/10.1007/978-3-030-51938-4_18 |
work_keys_str_mv | AT demicheligabrielle ataleofthreesignaturespracticalattackofecdsawithwnaf AT piauremi ataleofthreesignaturespracticalattackofecdsawithwnaf AT pierrotcecile ataleofthreesignaturespracticalattackofecdsawithwnaf AT demicheligabrielle taleofthreesignaturespracticalattackofecdsawithwnaf AT piauremi taleofthreesignaturespracticalattackofecdsawithwnaf AT pierrotcecile taleofthreesignaturespracticalattackofecdsawithwnaf |