[Resource Topic] 2004/277: Experimenting with Faults, Lattices and the DSA

Welcome to the resource topic for 2004/277

Title:
Experimenting with Faults, Lattices and the DSA

Authors: David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan

Abstract:

We present an attack on DSA smart-cards which combines physical fault injection and lattice reduction techniques. This seems to be
the first (publicly reported) physical experiment allowing to concretely pull-out DSA keys out of smart-cards. We employ a particular type of fault attack known as a glitch attack, which will be used to actively modify the DSA nonce k used for generating the signature: k will be tampered with so that a number of its least significant bytes will flip to zero. Then we apply well-known lattice attacks on El Gamal-type signatures which can recover the private key, given sufficiently many signatures such that a few bits of each corresponding k are known. In practice, when one byte of each k is zeroed, 27 signatures are sufficient to disclose the private key. The more bytes of k we can reset, the fewer signatures will be required. This paper presents the theory, methodology and results of the attack as well as possible countermeasures.

ePrint: https://eprint.iacr.org/2004/277

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .