Abstract
Gaining the value of k is a key technology for side-channel attack on DSA. In order to recover the private key of a DSA signature, this paper proposes a method based on data-cache timing attack. That is getting side channel information about a random number k used in a signature first and then recover the private key x from this. We mainly introduces the principle of data-cache timing attack and describe the method of gaining said k.