2021
DOI: 10.46586/tches.v2021.i4.1-26
|View full text |Cite
|
Sign up to set email alerts
|

Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries

Abstract: In this paper, we propose a novel key recovery attack against secure ECDSA signature generation employing regular table-based scalar multiplication. Our attack exploits novel leakage, denoted by collision information, which can be constructed by iteratively determining whether two entries loaded from the table are the same or not through side-channel collision analysis. Without knowing the actual value of the table entries, an adversary can recover the private key of ECDSA by finding the condition for which se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…See Figure 2 for our setup. We collected 50 traces even though our method requires at most 27 (=8+16+2+1) traces 4 , which is one more than the sum of the possible entry number in the first iteration, the remaining iterations, and the final point addition. We apply an additional 5 MHz low-pass filter to all measured traces for noise reduction.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…See Figure 2 for our setup. We collected 50 traces even though our method requires at most 27 (=8+16+2+1) traces 4 , which is one more than the sum of the possible entry number in the first iteration, the remaining iterations, and the final point addition. We apply an additional 5 MHz low-pass filter to all measured traces for noise reduction.…”
Section: Methodsmentioning
confidence: 99%
“…It thus may be difficult to succeed with a single trace attack against table-based scalar multiplication. Another form of key recovery attack against ECDSA employing table-based scalar multiplication by exploiting collisions between unknown entries has been introduced [4]. In the next section, we introduce this attack in order to better understand the approach proposed in the present paper.…”
Section: Related Work On Side-channel Analysis On Ecdsa Signature Gen...mentioning
confidence: 99%
See 3 more Smart Citations