[Resource Topic] 2010/582: Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems

Welcome to the resource topic for 2010/582

Title:
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems

Authors: Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin

Abstract:

Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do not seem critical must be protected. From the attacks against RSA, we develop a new attack of DLP-based cryptosystems, built in addition on a lattice analysis to recover DSA public keys from partially known nonces. Based on a realistic fault model, our attack only requires 16 faulty signatures to recover a 160-bit DSA secret key within a few minutes on a standard PC. These results significantly improves the previous public element fault attack in the context of DLP-based cryptosystems.

ePrint: https://eprint.iacr.org/2010/582

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .