会议专题

Research on L3 Cache Timing Attack against DSA Adopting Square-and-Multiply Algorithm

  L3 Cache timing attack is recently proposed as a new type of Cache timing attacks.In this paper we implement this new ideal on the DSA and demonstrate that the DSA is also vulnerable to L3 Cache attack.We propose a method to break the DSA by spying on the exponentiation step and recover the nonce.We also propose an operations recovery algorithm for recovering the sequence of operations performed during signing.Experiments are conducted and the results show that the success rate of full nonce recovery is 63%.

DSA public-key cryptography L3 cache attack side channel attacks

ZHOU Ping WANG Tao CHEN Hao

Department of Information Engineering Ordnance Engineering College Shijiazhuang, China

国际会议

2015 Fifth International Conference on Instrumentation and Measurement,Computer,Communication and Control (IMCCC2015)(第五届仪器测量、计算机通信与控制国际会议)

秦皇岛

英文

1390-1393

2015-09-18(万方平台首次上网日期,不代表论文的发表时间)