Cryptology ePrint Archive: Report 2014/636

Improved Timing Attacks on ECDSA

Vikram Singh

Abstract: We improve the timing attack on ECDSA in [1] by Brumley and Tuveri. We use the Gaussian heuristic to analyse the length of error vectors in the lattice Close Vector Problem in order to determine the problems which are theoretically solvable. Then we cost each solution using a strengthened lattice reduction algorithm and Schnorr-Euchner enumeration to determine which problems are practically solvable. The original work by Brumley and Tuveri resulted in OpenSSL's ECDSA being updated to remove the timing information they exploited, so that application is not vulnerable to our improvements. However we publish this work as a general advance in side-channel recovery techniques which may be applicable in related scenarios.

Category / Keywords: implementation / Cryptography, Lattice, ECDSA, OpenSSL, TLS, Side-channel, Timing Attack, Digital Signature Scheme, HKZ-reduction, Lattice Enumeration

Date: received 18 Aug 2014

Contact author: vs77814 at gmx com

Available format(s): PDF | BibTeX Citation

Version: 20140821:011016 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]