2004
DOI: 10.1007/978-3-540-28632-5_31
|View full text |Cite
|
Sign up to set email alerts
|

Attacking DSA Under a Repeated Bits Assumption

Abstract: Abstract.We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a second order nature that allows the attacker to know whether certain bits of the ephemeral key are equal, without actually knowing their values. Therefore, we extend the work of Howgrave-Graham, Smart, Nguyen and Shparlinski who, in contrast, examine the case where the attacker knows the actual value of such bits. We also disc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…At CHES 2004, three papers based on the idea of collision attack were published [9,10,11]. Additionally, at the same conference, Leadbitter et al [12] reported that they had expanded the attack exploiting internal collision to apply it on DSA style signature schemes. This section surveys the attacks exploiting internal collision published after the proposal of the original cache attack [2].…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…At CHES 2004, three papers based on the idea of collision attack were published [9,10,11]. Additionally, at the same conference, Leadbitter et al [12] reported that they had expanded the attack exploiting internal collision to apply it on DSA style signature schemes. This section surveys the attacks exploiting internal collision published after the proposal of the original cache attack [2].…”
Section: Introductionmentioning
confidence: 98%
“…It also describes the results of experiment to determine how many messages said attack requires for recovering entire secret key for MISTY1 when implemented on a PC, and more importantly, when the key estimation method is improved and average method is embodied in it. [7] Analysis Not used 1 [12] Not used 2 [9,10,8,11,13] 2 Attacks exploiting internal collision…”
Section: Introductionmentioning
confidence: 99%
“…Very few results on the security of elliptic-curve signatures with noisy partial information on the nonces are known. In [LPS04], Leadbitter, Page and Smart considered adversaries that can determine some relation amongst the bits of the secret nonces rather than their specific values (but this relation is known with certainty). This work was recently extended by Faugère, Goyet and Renault in [FGR13].…”
Section: Introductionmentioning
confidence: 99%
“…A number of papers address the question when a large number of observations are available [6,11,12,9]. When only one observation is possible, probabilistic algorithms are known, but they usually assumed that the known bitstring is either in the most or the least significant bits of the key [15,16,23].…”
Section: Introductionmentioning
confidence: 99%