Cryptology ePrint Archive: Report 2013/346
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson
Abstract: In this paper we describe an attack against nonce leaks in 384-bit ECDSA using an FFT-based attack due to Bleichenbacher. The signatures were computed by a modern smart card. We extracted the low-order bits of each nonce using a template-based power analysis attack against the modular inversion of the nonce. We also developed a BKZ-based method for the range reduction phase of the attack, as it was impractical to collect enough signatures for the collision searches originally used by Bleichenbacher. We confirmed our attack by extracting the entire signing key using a 5-bit nonce leak from 4000 signatures.
Category / Keywords: public-key cryptography / cryptanalysis,digital signatures,lattice techniques,public-key cryptography,smart cards
Publication Info: Accepted at CHES 2013,
Date: received 5 Jun 2013
Contact author: elke at cryptography com
Available format(s): PDF | BibTeX Citation
Version: 20130609:194619 (All versions of this report)
Short URL: ia.cr/2013/346
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]