2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography 2008
DOI: 10.1109/fdtc.2008.15
|View full text |Cite
|
Sign up to set email alerts
|

Fault Attack on Elliptic Curve Montgomery Ladder Implementation

Abstract: In this paper, we present a new fault attack on elliptic curve scalar product algorithms. This attack is tailored to work on the classical Montgomery ladder method when the y-coordinate is not used. No weakness has been reported so far on such implementations, which are very efficient and were promoted by several authors. But taking into account the twist of the elliptic curves, we show how, with few faults (around one or two faults), we can retrieve the full secret exponent even if classical countermeasures a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
53
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(53 citation statements)
references
References 20 publications
0
53
0
Order By: Relevance
“…Superficially, E is what we would normally call twist-secure (in the sense of Bernstein [3] and Fouque-Réal-Lercier-Valette [13]), since its twist E has a similar security level. Indeed, E (and the whole class of curves from which it was drawn) was designed with this notion of twist-security in mind.…”
Section: The Curvementioning
confidence: 99%
See 1 more Smart Citation
“…Superficially, E is what we would normally call twist-secure (in the sense of Bernstein [3] and Fouque-Réal-Lercier-Valette [13]), since its twist E has a similar security level. Indeed, E (and the whole class of curves from which it was drawn) was designed with this notion of twist-security in mind.…”
Section: The Curvementioning
confidence: 99%
“…We saw in §2 that DLPs on E and its twist E have essentially the same difficulty, while Proposition 3 shows that the real DLP instances presented to an adversary by 127-bit multiscalar multiplications are not biased into a significantly more attackable range. But there is an additional subtlety when we consider the fault attacks considered in [3] and [13]: If we try to compute [m]P for P on E, but an adversary sneaks in a point P on the twist E instead, then in the classical context the adversary can derive m after solving the discrete logarithm …”
Section: Theorem 1 Given An Integer M Let (A B) Be the Multiscalarmentioning
confidence: 99%
“…Sign change fault attacks were also described against PBC [180]. In 2008, an attack tailored to the Montgomery ladder was presented [69]. The authors state that they can reveal the secret scalar with only one or two faults, even in the presence of countermeasures which aim at preventing fault attacks.…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%
“…Another attack, directly targeted at the ECC structure, is described in [55], where the authors notice that a fault injected into the point coordinates during the scalar multiplication may move the point into a subgroup of the main group of curve points (called a twist of the curve), which has a smaller number of points. The authors show that their attack technique is able to successfully break curves standardized by both NIST [56] and IEEE [57] up to a security level equivalent to the one provided by the AES with a 128-bit key.…”
Section: Attacks On Eccmentioning
confidence: 99%