2017
DOI: 10.1007/978-3-319-69453-5_7
|View full text |Cite
|
Sign up to set email alerts
|

Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication

Abstract: Elliptic curve cryptography is today the prevailing approach to get efficient public-key cryptosystems and digital signatures. Most of elliptic curve signature schemes use a nonce in the computation of each signature and the knowledge of this nonce is sufficient to fully recover the secret key of the scheme. Even a few bits of the nonce over several signatures allow a complete break of the scheme by lattice-based attacks. Several works have investigated how to efficiently apply such attacks when partial inform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Since then, the HNP was used in many attacks against biased or leaked nonces in (EC)DSA, often utilizing side channels such as timing [ABuH Other attacks utilizing the HNP include using information about nonce distribution [BH19] or fault injection in the case of the SM2 signature algorithm [LCL13]. There have also been some theoretical extensions [FGR12;GRV16;HR06]. Finally, a very different approach was taken by Mulder et al [MHM + 13], where lattice reduction is used just as a processing step, and the core of the method lies in the Fast Fourier Transform.…”
Section: Related Workmentioning
confidence: 99%
“…Since then, the HNP was used in many attacks against biased or leaked nonces in (EC)DSA, often utilizing side channels such as timing [ABuH Other attacks utilizing the HNP include using information about nonce distribution [BH19] or fault injection in the case of the SM2 signature algorithm [LCL13]. There have also been some theoretical extensions [FGR12;GRV16;HR06]. Finally, a very different approach was taken by Mulder et al [MHM + 13], where lattice reduction is used just as a processing step, and the core of the method lies in the Fast Fourier Transform.…”
Section: Related Workmentioning
confidence: 99%
“…In [13], Coron proposed notably to randomize the exponent and the projective coordinates of the base point. It is an interesting question to extend our attacks in such setting (as it was done recently for ECDSA in [15]). It is also interesting to study the security against side-channel attacks of the pairing-based signatures whose design does not rely on the exponent inversion framework (i.e.…”
Section: Conclusion and Open Questionsmentioning
confidence: 99%
“…In such a context, the adversary has no choice but to rely on single-trace attacks which exploit a single leakage trace to infer significant information on the (randomized) scalar. Note that partial information on randomized scalars might still be exploitable, either in the fixed scalar case [SI11,RIL19] or in the nonce scalar case [GRV16], but this partial information must still be significant to retrieve the original scalar (or to break the underlying scheme in the nonce scenario). Several attack techniques exist which aim at making the most of a single leakage trace to fully recover the (randomized) scalar, or at least a significant part of it.…”
Section: Advanced Single-trace Side-channel Attacksmentioning
confidence: 99%