{"title":"On the DSA Key Recovery Attack with Variable Partial Nonces Known","authors":"Jiji Angel, Virendra Singh","doi":"10.1109/ISEA-ISAP49340.2020.235008","DOIUrl":null,"url":null,"abstract":"The security of Digital Signature Algorithm is based on the proven hardness of the number theoretic problem of discrete logarithm. However, in practice, this public key based digital signature algorithm is prone to side channel based attacks. In this work, we consider the cryptanalysis of Digital Signature Algorithm, when partial information on ephemeral keys can be obtained. We present a variant of the existing lattice based cryptanalytic method for DSA and further extend our work by analysing the scenario when variable number of least significant bits per ephemeral keys are known for a set of signatures pertaining to a signatory.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The security of Digital Signature Algorithm is based on the proven hardness of the number theoretic problem of discrete logarithm. However, in practice, this public key based digital signature algorithm is prone to side channel based attacks. In this work, we consider the cryptanalysis of Digital Signature Algorithm, when partial information on ephemeral keys can be obtained. We present a variant of the existing lattice based cryptanalytic method for DSA and further extend our work by analysing the scenario when variable number of least significant bits per ephemeral keys are known for a set of signatures pertaining to a signatory.