We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently. Using this result, we develop attacks against the DSA schemes which, under some assumptions, can provide the secret key in the case where one or several signed messages are available.
1 M. Bellare, S. Goldwasser and D. Micciancio, “Pseudo-random” number generation within cryptographic algorithms: The DSS case, Advances in Cryptology (CRYPTO '97), Lecture Notes in Comput. Sci. 1294, Springer, Berlin (1997), 277–291. 10.1007/BFb0052242Search in Google Scholar
4 R. Brent and P. Zimmerman, Modern Computer Arithmetic, Cambridge University Press, Cambridge, 2011. Search in Google Scholar
5 K. Draziotis and D. Poulakis, Lattice attacks on DSA schemes based on Lagrange's algorithm, Algebraic Informatics (CAI 2013), Lecture Notes in Comput. Sci. 8080, Springer, Berlin (2013), 119–131. 10.1007/978-3-642-40663-8_13Search in Google Scholar
7 J.-L. Faugère, C. Goyet and G. Renault, Attacking (EC)DSA given only an implicit hint, Selected Area of Cryptography (SAC 2012), Lecture Notes in Comput. Sci. 7707, Springer, Berlin (2013), 252–274. 10.1007/978-3-642-35999-6_17Search in Google Scholar
8 M. Girault, G. Poupard and J. Stern, Global Payment System (GPS): Un protocole de signature à la volée, Proceedings of Trusting Electronic Trade, 1999. Search in Google Scholar
14 A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997. Search in Google Scholar
15 D. Micciancio and P. Voulgaris, A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations, Proceedings of the 42nd Annual ACM Symposium on Theory of Computing (STOC '10), Association for Computing Machinery, New York (2010), 351–358. 10.1145/1806689.1806739Search in Google Scholar
17 P. Nguyen and I. E. Shparlinski, The insecurity of the elliptic curve digital signature algorithm with partially known nonces, Des. Codes Cryptogr. 30 (2003), 201–217. 10.1023/A:1025436905711Search in Google Scholar
19 D. R. Stinson, Cryptography, Theory and Practice, 2nd ed., Chapman & Hall/CRC, Boca Raton, 2001. Search in Google Scholar
20 National Institute of Standards and Technology (NIST), FIPS Publication 186: Digital Signature Standard, 1994. Search in Google Scholar
© 2016 by De Gruyter
This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.