Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978400
|View full text |Cite
|
Sign up to set email alerts
|

Attacking OpenSSL Implementation of ECDSA with a Few Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(34 citation statements)
references
References 25 publications
0
34
0
Order By: Relevance
“…The HNP introduced in 1996 by Boneh and Venkatesan [9] is applied to recover the secret key of a DSA-like signature [7,8,11] and their certain implementations such like OpenSSL [19], given some leaked bits of nonces. For any real z and prime n, define the symbol | · | n as |z| n = min b∈Z |z − bn|.…”
Section: Lemma 1 ([8]mentioning
confidence: 99%
See 1 more Smart Citation
“…The HNP introduced in 1996 by Boneh and Venkatesan [9] is applied to recover the secret key of a DSA-like signature [7,8,11] and their certain implementations such like OpenSSL [19], given some leaked bits of nonces. For any real z and prime n, define the symbol | · | n as |z| n = min b∈Z |z − bn|.…”
Section: Lemma 1 ([8]mentioning
confidence: 99%
“…EHNP significantly relaxes the strict limitations on the position of information leakage in HNP and this is very important to current side channel attacks. The technique was then improved and applied to attack OpenSSL implementions with windowed non-adjacent form (wNAF) on ECDSA [19].…”
Section: Introductionmentioning
confidence: 99%
“…The new device calculates a private key from a random number by using an algorithm such as the SHA256 algorithm [28], and then generates a public key by using another algorithm, such as the Secp256K1 algorithm [29]. In this way, a key pair is formed.…”
Section: Design Of Machine-equipment Blockchain In the Public Networkmentioning
confidence: 99%
“…There exists several recent works [7][8][9][10][11][12][13] on threats and security analysis of mobile applications and SSL/TLS deployment in mobile applications. Other HTTPS and TLS/SSLbased attack techniques are discussed in several works [14][15][16][17][18][19][20][21] There have been several existing solutions proposed specifically for SSL stripping attack, for example, ARP-related solutions [22,23], web script based solutions [24][25][26][27], MITM based solutions [28] and others [29][30][31][32][33]. However, there has been no survey that compiles all the solutions against SSL stripping-based session hijacking attacks which are crucial security threats for web users.…”
Section: Introductionmentioning
confidence: 99%