A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm

被引:0
|
作者
Jyotiyana, Deepti [1 ]
Saxena, Varun P. [1 ]
机构
[1] Govt Women Engn Coll, Dept Comp Sci & Engn, Ajmer, India
来源
关键词
Fault attack; Scalar multiplication; Elliptic curve cryptography; Elliptic curve digital signature algorithm;
D O I
10.1007/978-981-10-3935-5_29
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The dominant operation in cryptographic scheme of elliptic curve is the multiplication using point on an elliptic curve by an integer. This paper specifically discusses the competent algorithms for scalar multiplication a very tedious process in Elliptic Curve Cryptography that are relevant for systems using constrained resources like smart cards. The taxonomy of the work in the open literature for these devices is not only from security perspectives, but likewise some implementation attack, such as fault attacks, must be considered. We survey different implementation approaches and algorithms with the purpose of providing a valuable reference of implementing scalar multiplication in order to retrieve information with a way to determine secret signing key. In addition, this paper provides a review of injecting different fault attacks in a system constrained environment with Elliptic Curve Cryptography. Finally, some arguments about future scope that should be undertaken are provided.
引用
收藏
页码:283 / 291
页数:9
相关论文
共 50 条
  • [21] Elliptic Curve Scalar Multiplication with a Bijective Transform
    Nagai, Yoshitaka
    Shirase, Masaaki
    Izu, Tetsuya
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 280 - 286
  • [22] Parallel scalar multiplication for elliptic curve cryptosystems
    Ansari, B
    Wu, HP
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73
  • [23] Atomicity Improvement for Elliptic Curve Scalar Multiplication
    Giraud, Christophe
    Verneuil, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 80 - +
  • [24] Overview of Scalar Multiplication in Elliptic Curve Cryptography
    Li, Ye
    Feng, Liu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673
  • [25] Optimization algorithm for scalar multiplication in the elliptic curve cryptography over prime field
    Hao, Yuanling
    Ma, Shiwei
    Chen, Guanghua
    Zhang, Xiaoli
    Chen, Hui
    Zeng, Weimin
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2008, 5226 : 904 - +
  • [26] A parallel algorithm for computing simultaneous inversions with application to elliptic curve scalar multiplication
    Sarkar, P
    Mishra, PK
    Barua, R
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 782 - 785
  • [27] Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases
    Meloni, Nicolas
    Hasan, M. Anwar
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 304 - 316
  • [28] Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields
    Li, Xingran
    Yu, Wei
    Li, Bao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [29] Anti-Spa Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
    Shuang-Gen, Liu
    Heng, Xin
    Yuan-Meng, Li
    Shuang-Gen, Liu (liusgxupt@163.com), 1600, Femto Technique Co., Ltd. (22): : 1015 - 1021
  • [30] Concurrent realization of the multiply-by-7 elliptic curve scalar multiplication algorithm
    Department of Electrical and Electronic Engineering, Faculty of Engineering, University of Lagos, Lagos, Nigeria
    不详
    Int. Conf. Internet Technol. Secured Trans., ICITST, 2011, (797-804):