Paper 2010/582

Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems

Alexandre Berzati, Cécile Canovas-Dumas, and Louis Goubin

Abstract

Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do not seem critical must be protected. From the attacks against RSA, we develop a new attack of DLP-based cryptosystems, built in addition on a lattice analysis to recover DSA public keys from partially known nonces. Based on a realistic fault model, our attack only requires 16 faulty signatures to recover a 160-bit DSA secret key within a few minutes on a standard PC. These results significantly improves the previous public element fault attack in the context of DLP-based cryptosystems.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
DSAexponentiationfault injectionpublic moduluslattice reduction.
Contact author(s)
cecile dumas @ cea fr
History
2010-11-18: received
Short URL
https://ia.cr/2010/582
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/582,
      author = {Alexandre Berzati and Cécile Canovas-Dumas and Louis Goubin},
      title = {Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems},
      howpublished = {Cryptology ePrint Archive, Paper 2010/582},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/582}},
      url = {https://eprint.iacr.org/2010/582}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.