Title | ||
---|---|---|
Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version. |
Abstract | ||
---|---|---|
In this paper, we describe an attack against nonce leaks in 384-bit ECDSA using an FFT-based attack due to Bleichenbacher. The signatures were computed by a modern smart card. We extracted the low-order bits of each nonce using a template-based power analysis attack against the modular inversion of the nonce. We also developed a BKZ-based method for the range reduction phase of the attack, as it was impractical to collect enough signatures for the collision searches originally used by Bleichenbacher. We confirmed our attack by extracting the entire signing key using a 5-bit nonce leak from 4,000 signatures. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/s13389-014-0072-z | J. Cryptographic Engineering |
Keywords | Field | DocType |
Side channel analysis, ECDSA, Modular inversion, Hidden number problem, Bleichenbacher, FFT, LLL, BKZ | Elliptic Curve Digital Signature Algorithm,Power analysis,Hidden number problem,Computer security,Computer science,Smart card,Collision,Fast Fourier transform,Modular inversion,Cryptographic nonce,Embedded system | Journal |
Volume | Issue | ISSN |
4 | 1 | 2190-8516 |
Citations | PageRank | References |
7 | 0.52 | 14 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Elke De Mulder | 1 | 142 | 8.07 |
Michael Hutter | 2 | 345 | 25.26 |
Mark E. Marson | 3 | 12 | 1.33 |
Peter Pearson | 4 | 10 | 0.92 |