Filters








278 Hits in 1.8 sec

Template Attacks on ECDSA [chapter]

Marcel Medwed, Elisabeth Oswald
2009 Lecture Notes in Computer Science  
In this article we show that even SPA resistant implementations of ECDSA on a typical 32-bit platform succumb to template-based SPA attacks.  ...  Template attacks have been considered exclusively in the context of implementations of symmetric cryptographic algorithms on 8-bit devices.  ...  In the scenario of attacking ECDSA implementations, the template matching phase includes acquiring one power trace for one ECDSA signature generation operation.  ... 
doi:10.1007/978-3-642-00306-6_2 fatcat:s55hibjxqnhu5oecv3uekq3vdi

Online Template Attack on ECDSA: [chapter]

Niels Roelofs, Niels Samwel, Lejla Batina, Joan Daemen
2020 Lecture Notes in Computer Science  
We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack.  ...  The innovation is that we generate the profiling traces using ECDSA signature verification on the same device.  ...  The first one is on portability and the other one is the work on online template attacks.  ... 
doi:10.1007/978-3-030-51938-4_16 fatcat:jisfsgvezng2vaj4a4ktiebkqe

RASSLE: Return Address Stack based Side-channel LEakage

Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, Debdeep Mukhopadhyay
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Finally, we demonstrate a full end-to-end attack on OpenSSL ECDSA using curve parameters of curve P-256.  ...  iii) How an Elliptic Curve Digital Signature Algorithm (ECDSA) secret key on P-256 curve of OpenSSL can be revealed using Lattice Attack on partially leaked nonces with the aid of RASSLE?  ...  We also thank Arnab Sarkar for discussions and insights on using the deadline scheduler.  ... 
doi:10.46586/tches.v2021.i2.275-303 fatcat:yqkd65m3orc4bodm25segwg5sa

Efficient and Secure ECDSA Algorithm and its Applications: A Survey [article]

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2019 arXiv   pre-print
These algorithms heighten security against various attacks and at the same time improve performance to obtain efficiencies (time, memory, reduced computation complexity, and energy saving) in an environment  ...  This paper presents detailed and a comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications.  ...  bits k. • Template attack In this attack, the attacker creates templates with a large number of traces of the controlled device.  ... 
arXiv:1902.10313v1 fatcat:7k44pfghujbzdmoxpkynavzone

Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA [chapter]

Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
2013 Lecture Notes in Computer Science  
In this paper we describe an attack against nonce leaks in 384-bit ECDSA using an FFT-based attack due to Bleichenbacher. The signatures were computed by a modern smart card.  ...  We extracted the low-order bits of each nonce using a template-based power analysis attack against the modular inversion of the nonce.  ...  Conclusions In this paper we described an attack against a nonce leak in 384-bit ECDSA running on a smart card. We used a template attack to recover a few low-order bits from each nonce.  ... 
doi:10.1007/978-3-642-40349-1_25 fatcat:5byxs7b42jeb3iyaqwrjym3t54

Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version

Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
2014 Journal of Cryptographic Engineering  
In this paper we describe an attack against nonce leaks in 384-bit ECDSA using an FFT-based attack due to Bleichenbacher. The signatures were computed by a modern smart card.  ...  We extracted the loworder bits of each nonce using a template-based power analysis attack against the modular inversion of the nonce.  ...  Conclusions In this paper we described an attack against a nonce leak in 384-bit ECDSA running on a smart card. We used a template attack to recover a few low-order bits from each nonce.  ... 
doi:10.1007/s13389-014-0072-z fatcat:tsxqox2iajagbptnzfivike2t4

Online Template Attacks [chapter]

Lejla Batina, Łukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
2014 Lecture Notes in Computer Science  
In the context of attacking elliptic-curve scalar multiplication with template attacks, one can interleave template generation and template matching to reduce the amount of template traces.  ...  We show that OTA need only one power consumption trace of a scalar multiplication on the target device; they are thus suitable not only against ECDSA and static Diffie-Hellman, but also against elliptic-curve  ...  Medwed and Oswald demonstrated in [28] a practical template attack on ECDSA.  ... 
doi:10.1007/978-3-319-13039-2_2 fatcat:ehl5e57csjfiblhxli5xzofvuu

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We demonstrate full extraction of ECDSA secret signing keys from OpenSSL and CoreBitcoin running on iOS devices, and partial key leakage from OpenSSL running on Android and from iOS's CommonCrypto.  ...  We show that elliptic-curve cryptography implementations on mobile devices are vulnerable to electromagnetic and power side-channel attacks.  ...  Attacking OpenSSL ECDSA Signal Acquisition. We recorded the leakage of 5000 OpenSSL ECDSA signatures executed on an iPhone 3GS.  ... 
doi:10.1145/2976749.2978353 dblp:conf/ccs/GenkinPPTY16 fatcat:dkf5elxhtjfpxg4y5gyxnxs43u

A Survey on Efficient and Secure Implementation of ECDSA against Fault Attack

Kaushalya J
2020 International Journal of Emerging Trends in Engineering Research  
This paper presents a precise and complete review of an update of the Elliptic Curve Digital Signature (ECDSA) algorithm and fault attack and its countermeasures and describes about the future work to  ...  Elliptic Curve Cryptography (ECC) gives high security and preferable execution over other public key techniques and these algorithms strengthen against various attacks.  ...  Suganya, for helping us to focus on this domain, which helped us to learn a lot about ECC.  ... 
doi:10.30534/ijeter/2020/11872020 fatcat:wlqhx3xa5rbefkzsclzpmupduy

Déjà Vu: Side-Channel Analysis of Mozilla's NSS [article]

Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley
2020 arXiv   pre-print
Our evaluation uncovers several new vulnerabilities in NSS affecting DSA, ECDSA, and RSA cryptosystems.  ...  Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries.  ...  microarchitecture attack on ECDSA nonce encoding, EM attack on ECDSA point multiplication and EM attack on RSA key generation.  ... 
arXiv:2008.06004v1 fatcat:nmushfo5ujg5boynvxumo5dhsy

A Traceable Online Will System Based on Blockchain and Smart Contract Technology

Chin-Ling Chen, Ching-Ying Lin, Mao-Lun Chiang, Yong-Yuan Deng, Peizhi Chen, Yi-Jui Chiu
2021 Symmetry  
In this paper, we use the cryptography mechanism to propose an online will system based on blockchain and smart contract technology. The architecture considers effectiveness and cost reduction.  ...  solution when there are disputes over wills, and ensures the integrity of data, public verifiability, unforgeability, nonrepudiation, irreversibility of information, and the ability to resist counterfeiting attacks  ...  The blockchain center generates an ECDSA private key dx based on the role X, calculates QX=dX*G.  ... 
doi:10.3390/sym13030466 fatcat:zxgasq7cenfhvaxqbhgmcov2ge

Online template attacks

Lejla Batina, Łukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
2017 Journal of Cryptographic Engineering  
We show that online template attacks need only one power consumption trace of a scalar multiplication on the target device; they are thus suitable not only against ECDSA and static elliptic curve Diffie-Hellman  ...  In the context of attacking elliptic curve scalar multiplication with template attacks, one can interleave template generation and template matching and reduce the amount of template traces.  ...  Medwed and Oswald demonstrated in [35] a practical template attack on ECDSA.  ... 
doi:10.1007/s13389-017-0171-8 fatcat:lbjdumybt5crhl4wpquahi436a

A Novel Iris Authentication Using ECDSA

Srinivasan Nagaraj, G. S. V. P. Raju
2016 International Journal of Security and Its Applications  
We can enroll and add the number of images for authentication .It has been also performed more security if the image is recovered without being any side channel attack.  ...  The receiver end original image is recovered by using their decryption and authentication [8] is performed using ECDSA. The proposed technique is implemented for BMP images.  ...  /Acquisition device Examples of such attacks are spoofing biometric live features by using artificial presented to and accepted by the sensor and Attacking on the biometric reference data.  ... 
doi:10.14257/ijsia.2016.10.1.12 fatcat:vmtt4vatxnbkjdgw3sffv4eaiy

Improving CPA Attack Against DSA and ECDSA

Marek Repka, Michal Varchola, Miloš Drutarovský
2015 Journal of Electrical Engineering  
based on simulated attacks.  ...  In this work, we improved Correlation Power Analysis (CPA) attack against Digital Signature Algorithm (DSA) and its various derivations, such as Elliptic Curve Digital Signature Algorithm (ECDSA).  ...  In that work, attack against ECDSA implementation in passive RFID is performed.  ... 
doi:10.2478/jee-2015-0025 fatcat:6eff6ed7lzgctc6rah3xhzsie4

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks [chapter]

Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
2017 Lecture Notes in Computer Science  
We then show how to apply our tools in the contexts of ECDSA and ECDH implementations, and validate them against two targets: a Cortex-M4 and a Cortex-A8 micro-controllers. k0 Pr [k0 = 0] Pr [k1 = 1|k0  ...  In this paper, we present a systematic way to evaluate the security of such implementations against horizontal attacks.  ...  This time, we assume we are attacking an ECDSA secret key and use the probabilistic approach of Section 3.4 on ECDSA.  ... 
doi:10.1007/978-3-319-66787-4_26 fatcat:w3xpfpff7zf4hliips3kpcdmyi
« Previous Showing results 1 — 15 out of 278 results