Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/134994
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage
Author: Aranha, D.F.
Novaes, F.R.
Takahashi, A.
Tibouchi, M.
Yarom, Y.
Citation: Proceedings of the ACM Conference on Computer and Communications Security, 2020, pp.225-242
Publisher: Association for Computing Machinery
Publisher Place: online
Issue Date: 2020
ISBN: 9781450370899
ISSN: 1543-7221
Conference Name: Conference on Computer and Communications Security (ACM SIGSAC ) (9 Nov 2020 - 13 Nov 2020 : virtual online)
Statement of
Responsibility: 
Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom
Abstract: Although it is one of the most popular signature schemes today, ECDSA presents a number of implementation pitfalls, in particular due to the very sensitive nature of the random value (known as the nonce) generated as part of the signing algorithm. It is known that any small amount of nonce exposure or nonce bias can in principle lead to a full key recovery: the key recovery is then a particular instance of Boneh and Venkatesan’s hidden number problem (HNP). That observation has been practically exploited in many attacks in the literature, taking advantage of implementation defects or side-channel vulnerabilities in various concrete ECDSA implementations. However, most of the attacks so far have relied on at least 2 bits of nonce bias (except for the special case of curves at the 80-bit security level, for which attacks against 1-bit biases are known, albeit with a very high number of required signatures). In this paper, we uncover LadderLeak, a novel class of sidechannel vulnerabilities in implementations of the Montgomery ladder used in ECDSA scalar multiplication. The vulnerability is in particular present in several recent versions of OpenSSL. However, it leaks less than 1 bit of information about the nonce, in the sense that it reveals the most significant bit of the nonce, but with probability < 1. Exploiting such a mild leakage would be intractable using techniques present in the literature so far. However, we present a number of theoretical improvements of the Fourier analysis approach to solving the HNP (an approach originally due to Bleichenbacher), and this lets us practically break LadderLeak-vulnerable ECDSA implementations instantiated over the sect163r1 and NIST P-192 elliptic curves. In so doing, we achieve several significant computational records in practical attacks against the HNP.
Keywords: side-channel attack; cache attack; ECDSA; OpenSSL; Montgomery ladder; hidden number problem; Bleichenbacher’s attack; generalized birthday problem
Rights: © 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM.
DOI: 10.1145/3372297.3417268
Grant ID: http://purl.org/au-research/grants/arc/DE200101577
Published version: http://dx.doi.org/10.1145/3372297.3417268
Appears in Collections:Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.