Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack.

作者: Naomi Benger , Yuval Yarom

DOI:

关键词: Side channel attackEmbedded systemCryptographic nonceCacheElliptic Curve Digital Signature AlgorithmComputer science

摘要: … attack by analysing ECDSA and recovering … ECDSA, the Montgomery ladder and the FLUSH+RELOAD attack. Section 3 describes our attack on the OpenSSL implementation of ECDSA…

参考文章(32)
Billy Bob Brumley, Nicola Tuveri, Remote Timing Attacks Are Still Practical Computer Security – ESORICS 2011. pp. 355- 371 ,(2011) , 10.1007/978-3-642-23822-2_20
Daniel J. Bernstein, Tanja Lange, Peter Schwabe, The Security Impact of a New Cryptographic Library Progress in Cryptology – LATINCRYPT 2012. pp. 159- 176 ,(2012) , 10.1007/978-3-642-33481-8_9
Yuval Yarom, Katrina Falkner, None, FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack usenix security symposium. pp. 719- 732 ,(2014)
Phong Q. Nguyen, Igor E. Shparlinski, The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Designs, Codes and Cryptography. ,vol. 30, pp. 201- 217 ,(2003) , 10.1023/A:1025436905711
N. A. Howgrave-Graham, N. P. Smart, Lattice Attacks on Digital Signature Schemes Designs, Codes and Cryptography. ,vol. 23, pp. 283- 290 ,(2001) , 10.1023/A:1011214926272
Michael J. Wiener, Robert J. Zuccherato, Faster Attacks on Elliptic Curve Cryptosystems selected areas in cryptography. pp. 190- 200 ,(1998) , 10.1007/3-540-48892-8_15
Leonard M. Adleman, Jonathan DeMarrais, A subexponential algorithm for discrete logarithms over all finite fields international cryptology conference. pp. 147- 158 ,(1993) , 10.1007/3-540-48329-2_13
Billy Bob Brumley, Risto M. Hakala, Cache-Timing Template Attacks international conference on the theory and application of cryptology and information security. pp. 667- 684 ,(2009) , 10.1007/978-3-642-10366-7_39
Onur Acıiçmez, Billy Bob Brumley, Philipp Grabher, New results on instruction cache attacks cryptographic hardware and embedded systems. pp. 110- 124 ,(2010) , 10.1007/978-3-642-15031-9_8
Colin D. Walter, Longer Keys May Facilitate Side Channel Attacks Selected Areas in Cryptography. pp. 42- 57 ,(2004) , 10.1007/978-3-540-24654-1_4