Practical fault injection on deterministic signatures: The case of EdDSA

11Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

After recent vulnerabilities of implementations of deterministic signatures e.g. EdDSA have been revealed, it became evident that a secure deployment of those will require additional countermeasures. Nevertheless, this is not a simple task, as we show in this work. We demonstrate the easiness of fault attacks on EdDSA as implemented in the lightweight cryptographic library WolfSSL on a 32-bit micro-controller. We achieve a success rates of almost 100% by voltage glitching and electromagnetic fault injection. Even after adding certain checks as a countermeasure, the implementation remains vulnerable to fault injection. As only a single successful fault is needed to recover the key, this kind of implementation is an easy target for the attackers.

Author supplied keywords

Cite

CITATION STYLE

APA

Samwel, N., & Batina, L. (2018). Practical fault injection on deterministic signatures: The case of EdDSA. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10831 LNCS, pp. 306–321). Springer Verlag. https://doi.org/10.1007/978-3-319-89339-6_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free