Estamos realizando la búsqueda. Por favor, espere...
Abstract: Analyzing the security of cryptosystems under attacks based on the malicious modification of memory registers is a research topic of high importance. This type of attack may affect the randomness of the secret parameters by forcing a limited number of bits to a certain value which can be unknown to the attacker. In this context, we revisit the attack on DSA presented by Faugère, Goyet and Renault during the conference SAC 2012: we modify their method and provide a probabilistic approach in opposition to the heuristic proposed therein to measure the limits of the attack. More precisely, the main problem is formulated as a closest vector problem in a lattice, then we study the distribution of vectors with bounded norm in the lattices involved and apply the result to predict the attack behavior. The benefits of this approach are several: The probability of success of this attack can be lower bounded under some conjecture, which is validated by computational experiments. Also, it finds applications to the FLUSH+RELOAD side-channel attack, studied by van de Pol et al. At the end of the article, there is a summary of findings.
Fuente: Designs, Codes and Cryptography 2019, 87, 2469-2488
Fecha de publicación: 01/04/2019
Tipo de publicación: Artículo de Revista
Proyecto español: MTM2014-55421-P
Url de la publicación: https://doi.org/10.1007/s10623-019-00633-w
ANA ISABEL GOMEZ PEREZ
DOMINGO GOMEZ PEREZ