Cold Boot Attacks in the Discrete Logarithm Setting

@inproceedings{Poettering2015ColdBA,
  title={Cold Boot Attacks in the Discrete Logarithm Setting},
  author={Bertram Poettering and Dale L. Sibborn},
  booktitle={IACR Cryptology ePrint Archive},
  year={2015}
}
In a cold boot attack a cryptosystem is compromised by analysing a noisy version of its internal state. For instance, if a computer is rebooted the memory contents are rarely fully reset; instead, after the reboot an adversary might recover a noisy image of the old memory contents and use it as a stepping stone for reconstructing secret keys. While such attacks were known for a long time, they recently experienced a revival in the academic literature. Here, typically either RSA-based schemes or… CONTINUE READING