A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The dominant operation in cryptographic scheme of elliptic curve is the multiplication using point on an elliptic curve by an integer. This paper specifically discusses the competent algorithms for scalar multiplication a very tedious process in Elliptic Curve Cryptography that are relevant for systems using constrained resources like smart cards. The taxonomy of the work in the open literature for these devices is not only from security perspectives, but likewise some implementation attack, such as fault attacks, must be considered. We survey different implementation approaches and algorithms with the purpose of providing a valuable reference of implementing scalar multiplication in order to retrieve information with a way to determine secret signing key. In addition, this paper provides a review of injecting different fault attacks in a system constrained environment with Elliptic Curve Cryptography. Finally, some arguments about future scope that should be undertaken are provided.

Cite

CITATION STYLE

APA

Jyotiyana, D., & Saxena, V. P. (2017). A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. In Lecture Notes in Networks and Systems (Vol. 12, pp. 283–291). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-10-3935-5_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free