Bit-flip faults on elliptic curve base fields, revisited

8Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As part of their investigation of fault attacks on elliptic curve cryptosystems, Ciet and Joye showed, back in 2003, that perturbing the value representing the cardinality of the base field in a physical implementation of ECC could result in a partial key recovery. They had to assume, however, that the perturbed computation would "succeed" in some sense, and that is rather unlikely to happen in practice. In this paper, we extend their analysis and show that, in a somewhat stronger fault model, full key recovery is possible with a single fault. For example, our fault attack typically reduces 256-bit ECDLP to solving discrete logarithm problems in a few random elliptic curves over fields of less than 60 bits, which typically takes a matter of seconds. More generally, the asymptotic complexity of ECDLP becomes heuristically subexponential under our fault attack. Our attack also extends to a very efficient full key recovery attack on ECDSA with two faulty signatures. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Kim, T., & Tibouchi, M. (2014). Bit-flip faults on elliptic curve base fields, revisited. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8479 LNCS, pp. 163–180). Springer Verlag. https://doi.org/10.1007/978-3-319-07536-5_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free