Cryptology ePrint Archive: Report 2020/1506

Recovering cryptographic keys from partial information, by example

Gabrielle De Micheli and Nadia Heninger

Abstract: Side-channel attacks targeting cryptography may leak only partial or indirect information about the secret keys. There are a variety of techniques in the literature for recovering secret keys from partial information. In this tutorial, we survey several of the main families of partial key recovery algorithms for RSA, (EC)DSA, and (elliptic curve) Diffie-Hellman, the public-key cryptosystems in common use today. We categorize the known techniques by the structure of the information that is learned by the attacker, and give simplified examples for each technique to illustrate the underlying ideas.

Category / Keywords: public-key cryptography / cryptographic protocols, lattice techniques

Date: received 1 Dec 2020, last revised 11 Dec 2020

Contact author: gabrielle de-micheli at inria fr,nadiah@cs ucsd edu

Available format(s): PDF | BibTeX Citation

Version: 20201211:222201 (All versions of this report)

Short URL: ia.cr/2020/1506


[ Cryptology ePrint archive ]