[Resource Topic] 2020/1506: Recovering cryptographic keys from partial information, by example

Welcome to the resource topic for 2020/1506

Recovering cryptographic keys from partial information, by example

Authors: Gabrielle De Micheli, Nadia Heninger


Side-channel attacks targeting cryptography may leak only partial or indirect information about the secret keys. There are a variety of techniques in the literature for recovering secret keys from partial information. In this tutorial, we survey several of the main families of partial key recovery algorithms for RSA, (EC)DSA, and (elliptic curve) Diffie-Hellman, the public-key cryptosystems in common use today. We categorize the known techniques by the structure of the information that is learned by the attacker, and give simplified examples for each technique to illustrate the underlying ideas.

ePrint: https://eprint.iacr.org/2020/1506

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .