A Probabilistic Analysis on a Lattice Attack against DSA

12/28/2017
by   Domingo Gómez-Pérez, et al.
0

Analyzing the security of cryptosystems under attacks based on the malicious modification of memory registers is a research topic of high importance. This type of attacks may affect the randomness of the secret parameters by forcing a limited number of bits to a certain value which can be unknown to the attacker. In this context, we revisit the attack on DSA presented by Faugère, Goyet and Renault during the conference SAC 2012: we simplify their method and we provide a probabilistic approach in opposition to the heuristic proposed in the former to measure the limits of the attack. More precisely, the main problem is formulated as the search for a closest vector to a lattice, then we study the distribution of the vectors with bounded norms in a this family of lattices and we apply the result to predict the behavior of the attack. We validated this approach by computational experiments.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/17/2022

Message recovery attack to NTRU using a lattice independent from the public key

In the present paper we introduce a new attack on NTRU-HPS cryptosystem ...
research
09/15/2023

Lattice attack on group ring NTRU: The case of the dihedral group

Group ring NTRU (GR-NTRU) provides a general structure to design differe...
research
07/25/2022

Versatile Weight Attack via Flipping Limited Bits

To explore the vulnerability of deep neural networks (DNNs), many attack...
research
07/08/2023

Attacking (EC)DSA scheme with ephemeral keys sharing specific bits

In this paper, we present a deterministic attack on (EC)DSA signature sc...
research
04/28/2020

Parasite Chain Detection in the IOTA Protocol

In recent years several distributed ledger technologies based on directe...
research
04/11/2023

The Time for Reconstructing the Attack Graph in DDoS Attacks

Despite their frequency, denial-of-service (DoSDenial of Service (DoS), ...
research
04/09/2019

A new Hybrid Lattice Attack on Galbraith's Binary LWE Cryptosystem

LWE-based cryptosystems are an attractive alternative to traditional one...

Please sign up or login with your details

Forgot password? Click here to reset