Skip to main content

2004 | OriginalPaper | Buchkapitel

Attacking DSA Under a Repeated Bits Assumption

verfasst von : P. J. Leadbitter, D. Page, N. P. Smart

Erschienen in: Cryptographic Hardware and Embedded Systems - CHES 2004

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a second order nature that allows the attacker to know whether certain bits of the ephemeral key are equal, without actually knowing their values. Therefore, we extend the work of Howgrave-Graham, Smart, Nguyen and Shparlinski who, in contrast, examine the case where the attacker knows the actual value of such bits. We also discuss how such partial information leakage could occur in a real life scenario. Indeed, the type of leakage envisaged by our attack would appear to be feasible than that considered in the prior work.

Metadaten
Titel
Attacking DSA Under a Repeated Bits Assumption
verfasst von
P. J. Leadbitter
D. Page
N. P. Smart
Copyright-Jahr
2004
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-540-28632-5_31