Research on L3 Cache Timing Attack against DSA Adopting Square-and-Multiply Algorithm
L3 Cache timing attack is recently proposed as a new type of Cache timing attacks.In this paper we implement this new ideal on the DSA and demonstrate that the DSA is also vulnerable to L3 Cache attack.We propose a method to break the DSA by spying on the exponentiation step and recover the nonce.We also propose an operations recovery algorithm for recovering the sequence of operations performed during signing.Experiments are conducted and the results show that the success rate of full nonce recovery is 63%.
DSA public-key cryptography L3 cache attack side channel attacks
ZHOU Ping WANG Tao CHEN Hao
Department of Information Engineering Ordnance Engineering College Shijiazhuang, China
国际会议
秦皇岛
英文
1390-1393
2015-09-18(万方平台首次上网日期,不代表论文的发表时间)