A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm

被引:0
|
作者
Jyotiyana, Deepti [1 ]
Saxena, Varun P. [1 ]
机构
[1] Govt Women Engn Coll, Dept Comp Sci & Engn, Ajmer, India
来源
关键词
Fault attack; Scalar multiplication; Elliptic curve cryptography; Elliptic curve digital signature algorithm;
D O I
10.1007/978-981-10-3935-5_29
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The dominant operation in cryptographic scheme of elliptic curve is the multiplication using point on an elliptic curve by an integer. This paper specifically discusses the competent algorithms for scalar multiplication a very tedious process in Elliptic Curve Cryptography that are relevant for systems using constrained resources like smart cards. The taxonomy of the work in the open literature for these devices is not only from security perspectives, but likewise some implementation attack, such as fault attacks, must be considered. We survey different implementation approaches and algorithms with the purpose of providing a valuable reference of implementing scalar multiplication in order to retrieve information with a way to determine secret signing key. In addition, this paper provides a review of injecting different fault attacks in a system constrained environment with Elliptic Curve Cryptography. Finally, some arguments about future scope that should be undertaken are provided.
引用
收藏
页码:283 / 291
页数:9
相关论文
共 50 条
  • [41] Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
    Duo Liu
    Ping Luo
    Yi-Qi Dai
    Journal of Computer Science and Technology, 2007, 22 : 92 - 94
  • [42] Low-Latency Elliptic Curve Scalar Multiplication
    Bos, Joppe W.
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2012, 40 (05) : 532 - 550
  • [43] Elliptic Curve Scalar Multiplication with x-Coordinate
    ZHANG Ning1
    2. Ministry of Education Key Laboratory of Computer Networks and Information Security
    Wuhan University Journal of Natural Sciences, 2007, (01) : 163 - 166
  • [44] Analysis of Elliptic Curve Scalar Multiplication in Secure Communications
    Thomas, Christina
    Sheela, K. Gnana
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 611 - 615
  • [45] Pipelined computation of scalar multiplication in elliptic curve cryptosystems
    Mishra, PK
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 328 - 342
  • [46] Secure and Compact Elliptic Curve LR Scalar Multiplication
    Jin, Yaoan
    Miyaji, Atsuko
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 605 - 618
  • [47] Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
    Robert, Jean-Marc
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 445 - 462
  • [48] Efficient flush-reload cache attack on scalar multiplication based signature algorithm
    Ping Zhou
    Tao Wang
    Xiaoxuan Lou
    Xinjie Zhao
    Fan Zhang
    Shize Guo
    Science China Information Sciences, 2018, 61
  • [49] Low-Latency Elliptic Curve Scalar Multiplication
    Joppe W. Bos
    International Journal of Parallel Programming, 2012, 40 : 532 - 550
  • [50] Efficient Elliptic Curve Parallel Scalar Multiplication Methods
    Al-Otaibi, Ahmed
    Al-Somani, Turki F.
    Beckett, Paul
    2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 116 - 123