Abstract
We retrieve the ephemeral private key from the power trace of a single scalar multiplication in an ECDSA signature generation and from that the signing private key using an online template attack. The innovation is that we generate the profiling traces using ECDSA signature verification on the same device. The attack can be prevented by randomization of the (projective) coordinates of the base point.
Author supplied keywords
Cite
CITATION STYLE
Roelofs, N., Samwel, N., Batina, L., & Daemen, J. (2020). Online template attack on ecdsa:: extracting keys via the other side. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12174 LNCS, pp. 323–336). Springer. https://doi.org/10.1007/978-3-030-51938-4_16
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.