首页> 外文会议>International Conference on Selected Areas in Cryptography >Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication
【24h】

Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication

机译:用蒙蔽标量乘法对抗椭圆形曲线签名的格子攻击

获取原文

摘要

Elliptic curve cryptography is today the prevailing approach to get efficient public-key cryptosystems and digital signatures. Most of elliptic curve signature schemes use a nonce in the computation of each signature and the knowledge of this nonce is sufficient to fully recover the secret key of the scheme. Even a few bits of the nonce over several signatures allow a complete break of the scheme by lattice-based attacks. Several works have investigated how to efficiently apply such attacks when partial information on the nonce can be recovered through side-channel attacks. However, these attacks usually target unprotected implementation and/or make ideal assumptions on the recovered information, and it is not clear how they would perform in a scenario where common countermeasures are included and where only noisy information leaks via side channels. In this paper, we close this gap by applying such attack techniques against elliptic-curve signature implementations based on a blinded scalar multiplication. Specifically, we extend the famous Howgrave-Graham and Smart lattice attack when the nonces are blinded by the addition of a random multiple of the elliptic-curve group order or by a random Euclidean splitting. We then assume that noisy information on the blinded nonce can be obtained through a template attack targeting the underlying scalar multiplication and we show how to characterize the obtained likelihood scores under a realistic leakage assumption. To deal with this scenario, we introduce a filtering method which given a set of signatures and associated likelihood scores maximizes the success probability of the lattice attack. Our approach is backed up with attack simulation results for several signal-to-noise ratio of the exploited leakage.
机译:今天椭圆曲线密码体制是现行做法得到高效的公共密钥加密和数字签名。大多数的椭圆曲线签名方案的使用随机数在每个签名的计算和这个随机数的知识足以完全恢复计划的密钥。随机数在几个签名,甚至几个位允许基于网格的攻击计划的彻底决裂。几部作品已经研究了如何有效地应用这种攻击时,在现时的部分信息可以通过侧信道攻击恢复。然而,这些攻击通常针对未受保护的实施和/或作出理想的假设上,恢复的信息,并且目前还不清楚他们将如何在一个场景中常见的对策包括何通过侧通道只有嘈杂的信息泄露进行。在本文中,我们附近对基于盲标量乘法椭圆曲线签名实现应用这种攻击技术这一空白。具体来说,我们延长了著名Howgrave - 格雷厄姆和智能格攻击时,随机数是通过添加椭圆曲线组顺序随机多的或随机的欧几里得分裂蒙蔽。然后,我们假设可以通过模板攻击目标的基本标量乘法获得的盲现时嘈杂的信息,我们展示了如何描述一个现实的泄漏假设下所获得的似然度分数。为了应对这种情况,我们引入其给定一组签名和相关联的可能性分数的滤波方法最大化格攻击的成功概率。我们的做法是备份与攻击的模拟结果为利用泄漏的几个信噪比。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号