Paper 2020/615
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, and Yuval Yarom
Abstract
Although it is one of the most popular signature schemes today, ECDSA
presents a number of implementation pitfalls, in particular due to the
very sensitive nature of the random value (known as the nonce)
generated as part of the signing algorithm. It is known that any small
amount of nonce exposure or nonce bias can in principle lead to a full
key recovery: the key recovery is then a particular instance of Boneh and
Venkatesan's hidden number problem (HNP). That observation has
been practically exploited in many attacks in the literature, taking
advantage of implementation defects or side-channel vulnerabilities in
various concrete ECDSA implementations. However, most of the attacks so
far have relied on at least 2 bits of nonce bias (except for the
special case of curves at the
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. ACM CCS 2020
- DOI
- 10.1145/3372297.3417268
- Keywords
- side-channel attackcache attackECDSAOpenSSLMontgomery Ladderhidden number problemBleichenbacher's attackgeneralized birthday problem
- Contact author(s)
-
dfaranha @ eng au dk
ra135663 @ students ic unicamp br
takahashi @ cs au dk
takahashi akira 58s @ kyoto-u jp
mehdi tibouchi br @ hco ntt co jp
mehdi tibouchi @ normalesup org
yval @ cs adelaide edu au - History
- 2020-08-22: revised
- 2020-05-25: received
- See all versions
- Short URL
- https://ia.cr/2020/615
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/615, author = {Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom}, title = {{LadderLeak}: Breaking {ECDSA} With Less Than One Bit Of Nonce Leakage}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/615}, year = {2020}, doi = {10.1145/3372297.3417268}, url = {https://eprint.iacr.org/2020/615} }