Practical modifications of leadbitter et al.'s repeated-bits side-channel analysis on (EC)DSA

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this paper, we will report practical modifications of the side-channel analysis to (EC)DSA [1,2,4,31] that Leadbitter et al. have proposed in [12]. To apply the analyses, we assume that the window method is used in the exponentiation (EC scalar multiplication) calculation and the side-channel information described in Section 2 can be collected. So far, the method in [12] haven't been effective when q is 160 bit long and the window size w < 9, We show that the modified method we propose in this paper is effective even when q is 160 bit long and w = 4, that is, in the case of frequent implementation. First, we estimate the window size w necessary for the proposed analyses (attacks) to succeed. Then by experiment of the new method, we show that private keys of (EC)DSA can be obtained under the above assumptions, in practical time and with sufficient success rate. The result raises the necessity of countermeasures against the analyses (attacks) in the window method based implementation of (EC)DSA.

Original languageEnglish
Title of host publicationInformation Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers
Pages259-270
Number of pages12
Publication statusPublished - 2005
Externally publishedYes
Event6th International Workshop on Information Security Applications, WISA 2005 - Jeju Island, Korea, Republic of
Duration: 2005 Aug 222005 Aug 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3786 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Workshop on Information Security Applications, WISA 2005
CountryKorea, Republic of
CityJeju Island
Period05/8/2205/8/24

Keywords

  • (EC)DSA
  • Lattice basis reduction algorithm
  • Side-channel analysis (attack)
  • Window method

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Practical modifications of leadbitter et al.'s repeated-bits side-channel analysis on (EC)DSA'. Together they form a unique fingerprint.

Cite this