Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-77026-8_17
|View full text |Cite
|
Sign up to set email alerts
|

Solving Discrete Logarithms from Partial Knowledge of the Key

Abstract: Abstract. For elliptic curve based cryptosystems, the discrete logarithm problem must be hard to solve. But even when this is true from a mathematical point of view, side-channel attacks could be used to reveal information about the key if proper countermeasures are not used. In this paper, we study the difficulty of the discrete logarithm problem when partial information about the key is revealed by side channel attacks. We provide algorithms to solve the discrete logarithm problem for generic groups with par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0
4

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(22 citation statements)
references
References 24 publications
0
18
0
4
Order By: Relevance
“…On the other hand, due to the out-layer extractor, we cannot directly adopt any known (generic) DLP algorithms, such as [GTY07,GPR13]. Instead, our puzzle solver just exhaustively searches for a valid solution.…”
Section: The Dlp Based Puzzle and Calibrating Its Hardnessmentioning
confidence: 99%
“…On the other hand, due to the out-layer extractor, we cannot directly adopt any known (generic) DLP algorithms, such as [GTY07,GPR13]. Instead, our puzzle solver just exhaustively searches for a valid solution.…”
Section: The Dlp Based Puzzle and Calibrating Its Hardnessmentioning
confidence: 99%
“…Gopalakrishnan, Thériault, and Yao [8] studied key recovery for ECC if a side-channel attack only provided some bits of the key. In contrast to our model they assume that the known bits are absolutely correct and do not discuss the possibility that we might have partial information on a subkey.…”
Section: Comparison and Conclusionmentioning
confidence: 99%
“…Often there are too few bits fully recovered to make searching the remaining key space feasible. Using not only fully recovered bits but also the partial information we can search an interval smartly and possibly recover the solution to the DLP where [8] could not. Finally, they do not consider enumeration and rank computation.…”
Section: Comparison and Conclusionmentioning
confidence: 99%
See 2 more Smart Citations