Cargando…

A Tale of Three Signatures: Practical Attack of ECDSA with wNAF

Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this paper, we reinvestigate the construction of the lattice used in one of these methods, the Extended Hi...

Descripción completa

Detalles Bibliográficos
Autores principales: De Micheli, Gabrielle, Piau, Rémi, Pierrot, Cécile
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334987/
http://dx.doi.org/10.1007/978-3-030-51938-4_18
_version_ 1783554045651189760
author De Micheli, Gabrielle
Piau, Rémi
Pierrot, Cécile
author_facet De Micheli, Gabrielle
Piau, Rémi
Pierrot, Cécile
author_sort De Micheli, Gabrielle
collection PubMed
description Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this paper, we reinvestigate the construction of the lattice used in one of these methods, the Extended Hidden Number Problem (EHNP). We find the secret key with only 3 signatures, thus reaching a known theoretical bound, whereas best previous methods required at least 4 signatures in practice. Given a specific leakage model, our attack is more efficient than previous attacks, and for most cases, has better probability of success. To obtain such results, we perform a detailed analysis of the parameters used in the attack and introduce a preprocessing method which reduces by a factor up to 7 the total time to recover the secret key for some parameters. We perform an error resilience analysis which has never been done before in the setup of EHNP. Our construction find the secret key with a small amount of erroneous traces, up to [Formula: see text] of false digits, and [Formula: see text] with a specific type of error.
format Online
Article
Text
id pubmed-7334987
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73349872020-07-06 A Tale of Three Signatures: Practical Attack of ECDSA with wNAF De Micheli, Gabrielle Piau, Rémi Pierrot, Cécile Progress in Cryptology - AFRICACRYPT 2020 Article Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this paper, we reinvestigate the construction of the lattice used in one of these methods, the Extended Hidden Number Problem (EHNP). We find the secret key with only 3 signatures, thus reaching a known theoretical bound, whereas best previous methods required at least 4 signatures in practice. Given a specific leakage model, our attack is more efficient than previous attacks, and for most cases, has better probability of success. To obtain such results, we perform a detailed analysis of the parameters used in the attack and introduce a preprocessing method which reduces by a factor up to 7 the total time to recover the secret key for some parameters. We perform an error resilience analysis which has never been done before in the setup of EHNP. Our construction find the secret key with a small amount of erroneous traces, up to [Formula: see text] of false digits, and [Formula: see text] with a specific type of error. 2020-06-06 /pmc/articles/PMC7334987/ http://dx.doi.org/10.1007/978-3-030-51938-4_18 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
De Micheli, Gabrielle
Piau, Rémi
Pierrot, Cécile
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
title A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
title_full A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
title_fullStr A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
title_full_unstemmed A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
title_short A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
title_sort tale of three signatures: practical attack of ecdsa with wnaf
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334987/
http://dx.doi.org/10.1007/978-3-030-51938-4_18
work_keys_str_mv AT demicheligabrielle ataleofthreesignaturespracticalattackofecdsawithwnaf
AT piauremi ataleofthreesignaturespracticalattackofecdsawithwnaf
AT pierrotcecile ataleofthreesignaturespracticalattackofecdsawithwnaf
AT demicheligabrielle taleofthreesignaturespracticalattackofecdsawithwnaf
AT piauremi taleofthreesignaturespracticalattackofecdsawithwnaf
AT pierrotcecile taleofthreesignaturespracticalattackofecdsawithwnaf