A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm

被引:0
|
作者
Jyotiyana, Deepti [1 ]
Saxena, Varun P. [1 ]
机构
[1] Govt Women Engn Coll, Dept Comp Sci & Engn, Ajmer, India
来源
关键词
Fault attack; Scalar multiplication; Elliptic curve cryptography; Elliptic curve digital signature algorithm;
D O I
10.1007/978-981-10-3935-5_29
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The dominant operation in cryptographic scheme of elliptic curve is the multiplication using point on an elliptic curve by an integer. This paper specifically discusses the competent algorithms for scalar multiplication a very tedious process in Elliptic Curve Cryptography that are relevant for systems using constrained resources like smart cards. The taxonomy of the work in the open literature for these devices is not only from security perspectives, but likewise some implementation attack, such as fault attacks, must be considered. We survey different implementation approaches and algorithms with the purpose of providing a valuable reference of implementing scalar multiplication in order to retrieve information with a way to determine secret signing key. In addition, this paper provides a review of injecting different fault attacks in a system constrained environment with Elliptic Curve Cryptography. Finally, some arguments about future scope that should be undertaken are provided.
引用
收藏
页码:283 / 291
页数:9
相关论文
共 50 条
  • [31] A new elliptic curve scalar multiplication algorithm to resist simple power analysis
    Hitchcock, Y
    Montague, P
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 214 - 225
  • [32] Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System
    Akhter, Fatema
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 639 - 644
  • [33] An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm
    Bedoui, Mouna
    Bouallegue, Belgacem
    Mestiri, Hassen
    Hamdi, Belgacem
    Machhout, Mohsen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (08) : 11973 - 11992
  • [34] An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm
    Mouna Bedoui
    Belgacem Bouallegue
    Hassen Mestiri
    Belgacem Hamdi
    Mohsen Machhout
    Multimedia Tools and Applications, 2023, 82 : 11973 - 11992
  • [35] An elliptic curve implementation of the finite field Digital Signature Algorithm
    Koblitz, N
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 327 - 337
  • [36] On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC
    van Rijswijk-Deij, Roland
    Jonker, Mattijs
    Sperotto, Anna
    2016 12TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT AND WORKSHOPS(CNSM 2016), 2016, : 258 - 262
  • [37] A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm
    Bedoui M.
    Bouallegue B.
    Ahmed A.M.
    Hamdi B.
    Machhout M.
    Mahmoud
    Khattab M.
    Computer Systems Science and Engineering, 2023, 44 (03): : 2177 - 2193
  • [38] FPGA IMPLEMENTATION OF MODIFIED ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM
    Venkataraman, Kamalakannan
    Sadasivam, Tamilselvan
    FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2019, 32 (01) : 129 - 145
  • [39] Implementation of Elliptic Curve Digital Signature Algorithm on IRIS Nodes
    Zhang, Xing
    Ma, Shaohua
    Shi, Wei
    Han, Dong
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ESTIMATION, DETECTION AND INFORMATION FUSION ICEDIF 2015, 2015, : 403 - 406
  • [40] Attack on digital multi-signature scheme based on elliptic curve cryptosystem
    Liu, Duo
    Luo, Ping
    Dai, Yi-Qi
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 92 - 94