Flutterby™! : recovering the secret key for a 256-bit curve

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

recovering the secret key for a 256-bit curve

2014-03-13 17:36:34.725224+01 by Dan Lyke 0 comments

Cryptology ePrint Archive: Report 2014/161

Abstract: We apply the Flush-Reload side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. ... In particular we show that with as little as 200 signatures we are able to achieve a reasonable level of success in recovering the secret key for a 256-bit curve.

comments in ascending chronological order (reverse):