A Survey of Lattice Attack on Digital Signature Algorithm
2018, SSRN Electronic Journal
https://doi.org/10.2139/SSRN.3171541Abstract
Lattice-based cryptography is the use of conjectured hard problems on point lattices in 𝑹 𝒏 as the foundation for secure cryptographic systems. The Digital Signature Algorithm (DSA) computes a modular exponentiation with a per-message ephemeral secret. This involves a sequence of modulo square and multiply operations which, if known, leaks few bits of per-message ephemeral secret key which can be used in lattice based attack to obtain the DSA private key. This work surveys most of the major developments in lattice based attack on DSA with their pros and cons.
References (13)
- Wong, D. (2015). Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?. IACR Cryptology ePrint Archive, 2015, 839.
- Schnorr, C. P. (1988). A more efficient algorithm for lattice basis reduction. Journal of algorithms, 9(1), 47-62.
- Poulakis, D. (2011). Some lattice attacks on DSA and ECDSA. Applicable Algebra in Engineering, Communication and Computing, 22(5-6), 347- 358.
- Nguyen, P. Q., & Shparlinski, I. E. (2002). The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Journal of Cryptology, 15(3).
- Nguyen, P. Q., & Shparlinski, I. E. (2003). The insecurity of the elliptic curve digital signature algorithm with partially known nonces. Designs, codes and cryptography, 30(2), 201-217.
- Leadbitter, P. J., Page, D., & Smart, N. P. (2004, August). Attacking DSA under a repeated bits assumption. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 428-440). Springer, Berlin, Heidelberg.
- Kumar, R. S., Narasimham, C., & Setty, S. P. (2012). Lattice based attack on common private exponent RSA. IJCSI International Journal of Computer Science Issues, 9(2).
- Howgrave-Graham, N. A., & Smart, N. P. (2001). Lattice attacks on digital signature schemes. Designs, Codes and Cryptography, 23(3), 283-290.
- Hinek, M. J. (2004). Lattice attacks in cryptography: A partial overview. School of Computer Science, University of Waterloo, Canada.
- Faugere, J. C., Goyet, C., & Renault, G. (2012, August). Attacking (EC) DSA given only an implicit hint. In International Conference on Selected Areas in Cryptography (pp. 252-274). Springer, Berlin, Heidelberg.
- Draziotis, K., & Poulakis, D. (2013, September). Lattice attacks on DSA schemes based on Lagrange's algorithm. In International Conference on Algebraic Informatics (pp. 119-131). Springer, Berlin, Heidelberg.
- Draziotis, K. A. (2016). DSA lattice attacks based on Coppersmith's method. Information Processing Letters, 116(8), 541-545.
- Blake, I. F., & Garefalakis, T. (2002). On the security of the digital signature algorithm. Designs, Codes and Cryptography, 26(1-3), 87-96.