Skip to main content
Top

2017 | OriginalPaper | Chapter

A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm

Authors : Deepti Jyotiyana, Varun P. Saxena

Published in: Computing and Network Sustainability

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The dominant operation in cryptographic scheme of elliptic curve is the multiplication using point on an elliptic curve by an integer. This paper specifically discusses the competent algorithms for scalar multiplication a very tedious process in Elliptic Curve Cryptography that are relevant for systems using constrained resources like smart cards. The taxonomy of the work in the open literature for these devices is not only from security perspectives, but likewise some implementation attack, such as fault attacks, must be considered. We survey different implementation approaches and algorithms with the purpose of providing a valuable reference of implementing scalar multiplication in order to retrieve information with a way to determine secret signing key. In addition, this paper provides a review of injecting different fault attacks in a system constrained environment with Elliptic Curve Cryptography. Finally, some arguments about future scope that should be undertaken are provided.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Biehl I, Meyer B, Müller V (2000) Differential fault attacks on elliptic curve cryptosytems. In: Advances in cryptology—CRYPTO 2000. Springer, pp 131–146 Biehl I, Meyer B, Müller V (2000) Differential fault attacks on elliptic curve cryptosytems. In: Advances in cryptology—CRYPTO 2000. Springer, pp 131–146
2.
go back to reference Blömer J, Otto M, Seifert J-P (2006) Sign change fault attacks on elliptic curve crytosystems. In: Fault diagnosis and tolerance in cryptography. Springer, pp 36–52 Blömer J, Otto M, Seifert J-P (2006) Sign change fault attacks on elliptic curve crytosystems. In: Fault diagnosis and tolerance in cryptography. Springer, pp 36–52
3.
go back to reference Boneh D, DeMillo RA, Lipton RJ (2001) On the importance of eliminating errors in cryptographic computations. J Cryptology 14(2):101–119MathSciNetCrossRefMATH Boneh D, DeMillo RA, Lipton RJ (2001) On the importance of eliminating errors in cryptographic computations. J Cryptology 14(2):101–119MathSciNetCrossRefMATH
4.
go back to reference Saxena VP, Nalwaya P (2014) A novel cryptographic approach based on feedback mode of elgamal system. Int J Adv Res Sci Eng (IJARSE) 3(2):128–138. ISSN – 23198354 Saxena VP, Nalwaya P (2014) A novel cryptographic approach based on feedback mode of elgamal system. Int J Adv Res Sci Eng (IJARSE) 3(2):128–138. ISSN – 23198354
5.
go back to reference Saxena VP, Priya Nalwaya PN (2014) A cryptographic approach based on integrating running key in feedback mode of elgamal system. In: 2014 international conference on computational intelligence and communication networks (CICN). IEEE Computer Society, pp 719–724. http://doi.ieeecomputersociety.org/10.11 Saxena VP, Priya Nalwaya PN (2014) A cryptographic approach based on integrating running key in feedback mode of elgamal system. In: 2014 international conference on computational intelligence and communication networks (CICN). IEEE Computer Society, pp 719–724. http://​doi.​ieeecomputersoci​ety.​org/​10.​11
6.
go back to reference Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Advances in cryptology—CRYPTO’97. Springer, pp 513–525 Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Advances in cryptology—CRYPTO’97. Springer, pp 513–525
7.
go back to reference Barenghi A, Bertoni G, Palomba A, Susella R (2011) A novel fault attack against ECDSA. In: IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 161–166 Barenghi A, Bertoni G, Palomba A, Susella R (2011) A novel fault attack against ECDSA. In: IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 161–166
8.
go back to reference Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media
9.
go back to reference Booth AD (1980) A signed binary multiplication technique. Computer arithmetic-benchmark papers in electrical engineering and computer science, vol 21 Booth AD (1980) A signed binary multiplication technique. Computer arithmetic-benchmark papers in electrical engineering and computer science, vol 21
11.
go back to reference Li H, Zhang R, Yi J, Lv H (2013) A novel algorithm for scalar multiplication in ECDSA. In: 2013 fifth international conference on computational and information sciences (ICCIS). IEEE, pp 943–946 Li H, Zhang R, Yi J, Lv H (2013) A novel algorithm for scalar multiplication in ECDSA. In: 2013 fifth international conference on computational and information sciences (ICCIS). IEEE, pp 943–946
12.
go back to reference Fan J, Verbauwhede I (2012) An updated survey on secure ecc implementations: attacks, countermeasures and cost. In: Cryptography and security: from theory to applications. Springer, pp 265–282 Fan J, Verbauwhede I (2012) An updated survey on secure ecc implementations: attacks, countermeasures and cost. In: Cryptography and security: from theory to applications. Springer, pp 265–282
13.
go back to reference Saxena VP, Anubhav Saxena SM (2015) Implementation of fault attacks on elliptic curve cryptosystems. Reading, vol 3, no 4, p 0 Saxena VP, Anubhav Saxena SM (2015) Implementation of fault attacks on elliptic curve cryptosystems. Reading, vol 3, no 4, p 0
14.
go back to reference Amiel F, Clavier C, Tunstall M (2006) Fault analysis of dpa-resistant algorithms. In: Fault diagnosis and tolerance in cryptography. Springer, pp 223–236 Amiel F, Clavier C, Tunstall M (2006) Fault analysis of dpa-resistant algorithms. In: Fault diagnosis and tolerance in cryptography. Springer, pp 223–236
15.
go back to reference Ciet M, Joye M (2005) Elliptic curve cryptosystems in the presence of permanent and transient faults. Des Codes Crypt 36(1):33–43MathSciNetCrossRefMATH Ciet M, Joye M (2005) Elliptic curve cryptosystems in the presence of permanent and transient faults. Des Codes Crypt 36(1):33–43MathSciNetCrossRefMATH
16.
go back to reference Schmidt J-M, Medwed M (2009) A fault attack on ECDSA. In: 2009 Workshop on fault diagnosis and tolerance in cryptography (FDTC). IEEE, pp 93–99 Schmidt J-M, Medwed M (2009) A fault attack on ECDSA. In: 2009 Workshop on fault diagnosis and tolerance in cryptography (FDTC). IEEE, pp 93–99
17.
go back to reference Ling J, King B (2013) Smart card fault attacks on elliptic curve cryptography. In: 2013 IEEE 56th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 1255–1258 Ling J, King B (2013) Smart card fault attacks on elliptic curve cryptography. In: 2013 IEEE 56th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 1255–1258
Metadata
Title
A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm
Authors
Deepti Jyotiyana
Varun P. Saxena
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3935-5_29