The insecurity of the elliptic curve digital signature algorithm with partially known nonces (Q1412249): Difference between revisions
From MaRDI portal
Removed claim: author (P16): Item:Q920931 |
Changed an Item |
||
Property / author | |||
Property / author: Igor E. Shparlinski / rank | |||
Normal rank |
Revision as of 17:06, 21 February 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | The insecurity of the elliptic curve digital signature algorithm with partially known nonces |
scientific article |
Statements
The insecurity of the elliptic curve digital signature algorithm with partially known nonces (English)
0 references
10 November 2003
0 references
This paper contains the first provable polynomial-time attack against the elliptic curve digital signature algorithm, when the nonces are partially known. The ``nonces'' are the random integers used to disguise the contribution of the secret key in the digital signature. \textit{N. Howgrave-Graham} and \textit{N. Smart} [Des. Codes Cryptography 23, 283--290 (2001; Zbl 1006.94022)] proposed several heuristic attacks against DSA assuming that a certain (not too small) number of bits of the nonces are known. \textit{P. Q. Nguyen} and \textit{I. E. Shparlinski} [J. Cryptology 15, 151--176 (2002; Zbl 1009.94011)] obtained provable polynomial-time attacks to DSA when the nonces are partially known, based on a generalization of the work of Boneh-Venkatesan on the hidden number problem. In this paper these ideas are extended to the case of ECDSA, building on results on the distribution of ECDSA signatures, based on bounds of exponential sums valuated on \(x\)-coordinates of elliptic curves over finite fields.
0 references
ECDSA
0 references
provable security
0 references
elliptic curve
0 references
digital signature
0 references