A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm

被引:0
|
作者
Jyotiyana, Deepti [1 ]
Saxena, Varun P. [1 ]
机构
[1] Govt Women Engn Coll, Dept Comp Sci & Engn, Ajmer, India
来源
关键词
Fault attack; Scalar multiplication; Elliptic curve cryptography; Elliptic curve digital signature algorithm;
D O I
10.1007/978-981-10-3935-5_29
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The dominant operation in cryptographic scheme of elliptic curve is the multiplication using point on an elliptic curve by an integer. This paper specifically discusses the competent algorithms for scalar multiplication a very tedious process in Elliptic Curve Cryptography that are relevant for systems using constrained resources like smart cards. The taxonomy of the work in the open literature for these devices is not only from security perspectives, but likewise some implementation attack, such as fault attacks, must be considered. We survey different implementation approaches and algorithms with the purpose of providing a valuable reference of implementing scalar multiplication in order to retrieve information with a way to determine secret signing key. In addition, this paper provides a review of injecting different fault attacks in a system constrained environment with Elliptic Curve Cryptography. Finally, some arguments about future scope that should be undertaken are provided.
引用
收藏
页码:283 / 291
页数:9
相关论文
共 50 条
  • [1] Fault attack for Scalar Multiplication over Finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
    Jyotiyana, Deepti
    Saxena, Varun P.
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [2] Improved elliptic curve scalar multiplication algorithm
    Karthikeyan, E.
    Balasubramaniam, P.
    2006 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2007, : 254 - +
  • [3] An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
    Bedoui, Mouna
    Bouallegue, Belgacem
    Hamdi, Belgacem
    Machhout, Mohsen
    2019 IEEE INTERNATIONAL CONFERENCE ON DESIGN & TEST OF INTEGRATED MICRO & NANO-SYSTEMS (DTS), 2019,
  • [4] Elliptic curve scalar multiplication algorithm using complementary recoding
    Balasubramaniam, P.
    Karthikeyan, E.
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 190 (01) : 51 - 56
  • [5] New algorithm of elliptic curve multi-scalar multiplication
    Liu, Duo
    Dai, Yi-Qi
    Jisuanji Xuebao/Chinese Journal of Computers, 2008, 31 (07): : 1131 - 1137
  • [6] Multiple scalar-multiplication algorithm over elliptic curve
    Kobayashi, K
    Morita, H
    Hakuta, M
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (02) : 271 - 276
  • [7] An improved Elliptic Curve Digital Signature Algorithm
    Fan Ai-wan
    Lu Shu-xi
    MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 1024 - 1027
  • [8] The Elliptic Curve Digital Signature Algorithm (ECDSA)
    Don Johnson
    Alfred Menezes
    Scott Vanstone
    International Journal of Information Security, 2001, 1 (1) : 36 - 63
  • [9] Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip
    Wang, Xiang
    Wang, Liping
    Bai, Yuanchen
    He, Zhenxue
    Wang, Tao
    Xu, Bin
    Zhang, He
    Wang, Xiaocui
    Zhou, Cheng
    Wang, Weike
    Du, Pei
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1397 - 1401
  • [10] Elliptic Curve Cryptosystems and Scalar Multiplication
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (01): : 27 - 34