Paper 2011/633
Practical realisation and elimination of an ECC-related software bug attack
B. B. Brumley, M. Barbosa, D. Page, and F. Vercauteren
Abstract
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) private key from an associated SSL server via
Note: Updated to include details of invalid curve attack
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. This is the full version of a shorter paper to appear at CT-RSA 2012
- Keywords
- elliptic curveOpenSSLNISTfault attackbug attack
- Contact author(s)
- page @ cs bris ac uk
- History
- 2012-03-06: revised
- 2011-11-26: received
- See all versions
- Short URL
- https://ia.cr/2011/633
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/633, author = {B. B. Brumley and M. Barbosa and D. Page and F. Vercauteren}, title = {Practical realisation and elimination of an {ECC}-related software bug attack}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/633}, year = {2011}, url = {https://eprint.iacr.org/2011/633} }