Paper 2017/975

Differential Attacks on Deterministic Signatures

Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, and Bruce Murray


Deterministic signature schemes are becoming more popular, as illustrated by the deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need for high-quality randomness might have some advantages in certain use-cases. In this paper we outline a range of differential fault attacks and a differential power analysis attack against such deterministic schemes. This shows, contrary to some earlier works, that such signature schemes are not naturally protected against such advanced attacks. We discuss different countermeasures and propose to include entropy for low-cost protection against these attacks in scenarios where these attack vectors are a real threat: this does not require to change the key generation or the verification methods and results in a signature scheme which offers high performance and security for a wide range of use-cases.

Available format(s)
Public-key cryptography
Publication info
Preprint. MINOR revision.
Public-key algorithmsElliptic curve cryptographyDigital signaturesImplementation attacks and defensesHardware security
Contact author(s)
joppe bos @ nxp com
2017-10-10: revised
2017-10-05: received
See all versions
Short URL
Creative Commons Attribution


      author = {Christopher Ambrose and Joppe W.  Bos and Björn Fay and Marc Joye and Manfred Lochter and Bruce Murray},
      title = {Differential Attacks on Deterministic Signatures},
      howpublished = {Cryptology ePrint Archive, Paper 2017/975},
      year = {2017},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.