(EC)DSA lattice attacks based on Coppersmith's method

https://doi.org/10.1016/j.ipl.2016.04.001Get rights and content

Highlights

  • We apply a variant of Coppersmith's method to the Digital Signature Algorithm.

  • We use a Boneh–Durfee type lattice attack.

  • Our attack is feasible if the product of the keys k1a is small.

Abstract

We provide an attack to (EC)DSA digital signature built upon Coppersmith's method. We prove that, if a,k are the private and ephemeral key, respectively, of the (EC)DSA scheme and (k1modq)2a<0.262q1.157, then we can efficiently find a.

Section snippets

Introduction—statement of results

In the present paper we study Digital Signature Algorithm, DSA, and its elliptic curve variant, ECDSA [7]. Both are based on ElGamal signatures [8]. In these schemes Alice, the signer, randomly chooses a private key a from a public finite group G, with |G|=p, for some large prime p. Usually G is the finite group of integers modulo p or the group defined by the points of an elliptic curve over a finite field. Then, she publishes an element gG and R=ga, for some a randomly chosen from the set {1,

Auxiliary results

The main purpose of this section is to present some basic results necessary for the proof of Theorem 1.2. For some details of the computations in Lemma 2.4, Lemma 2.5 see [6, Chapter 6].

Lemma 2.1

Let h(x,y)R[x,y] is a sum of w monomials. Let X,Y in R>0 and integers x0,y0 such that |x0|<X,|y0|<Y. Suppose that

i. h(x0,y0)Z,  ii. h(xX,yY)=i,j(hi,jXiYj)2<1w,

then h(x0,y0)=0.

Proof

[6, FACT 2.4.1, p.17].  □

Lemma 2.2

Let L be a lattice and b1,b2,,bw is an LLL-reduced basis of L. Thenb1<2(w1)/4(detL)1/w,b22w/4(detL

Proof of the theorem

Multiplying both sides of equation (1) by (kr)1(modq), we getk1(a+h(m)r1)+(sr1)0(modq). If we setf(x,y)=x(y+A)+Bq, where A=[h(m)r1]q and B=[sr1]q, then we get f([k1]q,a)Z. We consider the lattice L generated by the rows of the matrix At,m (of Corollary 2.6) with f(x,y) be the polynomial defined by equation (4). We apply LLL algorithm to L and say b1 is the first LLL-reduced vector. Let H1(x,y) be the polynomial which corresponds to b1, that isH1(x,y)=b1(1,x/X,xy/XY,,y/Y,..,xmym+t/X

The improvement: proof of Proposition 1.1

If the dimension w of the lattice L is ≤35, then LLL algorithm will return, in practice, a shortest vector of the lattice. So the constant ζ(w) of relation (5) (it is a constant if we fix the dimension), can be replaced by another one which is much greater. If w35, then we shall replace the bound of the first LLL-reduced vector by w2πedet(L)1/w.

A shortest lattice vector has length Lw2πedet(L)1/w (the Gaussian heuristic holds in our lattices). To see this, we compute the first minimum L

An example

For the computations we used Sagemath [14]. Letq=1420781990420358144729370324145404355374905166249, be a 160-bits prime number, the secret keya=24251561979536311495125(75-bits) and the ephemeral keyk=913551645485465300451420923974053878879771609110(160-bits) Let (r,s) be the signature of the message m and let x(A+y)+B0(modq) the signing equation withA=269366230512225345569353296119811290445931088756,B=542189824416770300914626882856872739739223238744. We set f(x,y)=x(y+A)+Bq. Note that [k1]qa>

Conclusions

In this paper we improved the result of [13]. We applied Coppersmith's method to a lattice of Boneh–Durfee type [6]. The execution time of our attack is dominated by the running time of the LLL-algorithm in lattices of dimension 35. Our attack is valid when the private key and the inverse of one ephemeral key [k1]q satisfy a suitable inequality (k can be large). Equivalently, the attack holds if some bits of the keys are known. Note that, we do not address here how the bits of a and [k1]q are

Acknowledgements

The author is indebted to the anonymous referees for their helpful suggestions.

References (14)

  • L. Adleman et al.

    A subexponential algorithm for discrete logarithms over all finite fields

  • A. Becker et al.

    Solving shortest and closest vector problems: the decomposition approach

    LMS J. Com. Math.

    (2014)
  • I.F. Blake et al.

    On the security of the digital signature algorithm

    Des. Codes Cryptogr.

    (2002)
  • D. Boneh et al.

    Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes

  • Don Coppersmith

    Small solutions to polynomial equations, and low exponent RSA vulnerabilities

    J. Cryptology

    (1997)
  • Glenn Durfee

    Cryptanalysis of RSA using algebraic and lattice methods

    (2002)
  • FIPS PUB 186-4, Digital Signature Standard...
There are more references available in the full text version of this article.

Cited by (6)

View full text