Skip to main navigation Skip to search Skip to main content

Attacking (EC)DSA given only an implicit hint

  • Jean Charles Faugère
  • , Christopher Goyet
  • , Guénaël Renault

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We describe a lattice attack on DSA-like signature schemes under the assumption that implicit information on the ephemeral keys is known. Inspired by the implicit oracle of May and Ritzenhofen presented in the context of RSA (PKC2009), we assume that the ephemeral keys share a certain amount of bits without knowing the value of the shared bits. This work also extends results of Leadbitter, Page and Smart (CHES2004) which use a very similar type of partial information leakage. By eliminating the shared blocks of bits between the ephemeral keys, we provide lattices of small dimension (e.g. equal to the number of signatures) and thus obtain an efficient attack. More precisely, by using the LLL algorithm, the complexity of the attack is polynomial. We show that this method can work when ephemeral keys share certain amount of MSBs and/or LSBs, as well as contiguous blocks of shared bits in the middle. Under the Gaussian heuristic assumption, theoretical bounds on the number of shared bits in function of the number of signed messages are proven. Experimental results show that we are often able to go a few bits beyond the theoretical bound. For instance, if only 2 shared LSBs on each ephemeral keys of 200 signed messages (with no knowledge about the secret key) then the attack reveals the secret key. The success rate of this attack is about 90% when only 1 LSB is shared on each ephemeral keys associated with about 400 signed messages.

Original languageEnglish
Title of host publicationSelected Areas in Cryptography - 19th International Conference, SAC 2012, Revised Selected Papers
Pages252-274
Number of pages23
DOIs
Publication statusPublished - 24 Jan 2013
Externally publishedYes
Event19th International Conference on Selected Areas in Cryptography, SAC 2012 - Windsor, ON, Canada
Duration: 15 Aug 201216 Aug 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7707 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th International Conference on Selected Areas in Cryptography, SAC 2012
Country/TerritoryCanada
CityWindsor, ON
Period15/08/1216/08/12

Keywords

  • DLP
  • ECDSA
  • Implicit information
  • Lattice attack
  • Oracle

Fingerprint

Dive into the research topics of 'Attacking (EC)DSA given only an implicit hint'. Together they form a unique fingerprint.

Cite this