Protecting Elliptic Curve Cryptography Against Fault Injection Attacks
نویسندگان
چکیده
Context. A fault injection attack consists in modifying an intermediate value of a computation (using an electromagnetic pulse or by acting on the power supply of the circuit) and exploiting the faulted final result to gather information about the computation that would not be accessible in a correct final result. For instance, did you know that due to the simplicity of the arithmetic behind RSA, injecting a single fault in an RSA computation makes it possible to easily extract the secret key? [2] The state of the art of countermeasures consists in defining attack conditions [1] (states of the computation which lead to a faulted result exploitable by an attacker) and proving that implementations do not verify these conditions, even when faulted. Currently, there exists a bunch of different ad-hoc countermeasures of which few have been formalized (or proved). However, no systematic approaches have been developed. In the particular case of CRT-RSA, we have recently shown that existing countermeasures are effective against not only one but an arbitrary number of fault injections (up to a trivial adaptation) [4]. Some of these countermeasures were also able to thwart fault attacks that have been discovered after their publication. The particularity of these countermeasures is that they attempt to verify the integrity of the computation, in order to return the final result if and only if it is correct, thus avoiding any information leakage. The global idea behind these countermeasures is to achieve a verification in two different structures, one of which being entangled with the functional computation [3]. Therefore, an inconsistency in the redundant structure hints at a perturbation. Moreover, the mathematics employed by these protection techniques are not specific to the algorithm they protect, thus these countermeasures strategies can be applied to other cryptographic algorithms which also rely on arithmetic.
منابع مشابه
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
Many cryptosystems suffer from fault attacks when implemented in physical devices such as smart cards. Fault attacks on secret key elements have successfully targeted many protocols relying on the Elliptic Curve Discrete Logarithm Problem (ECDLP), the Integer Factorization Problem (IFP) or the Discrete Logarithm Problem (DLP). More recently, faults attacks have also been designed against the pu...
متن کاملProgrammable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. However, selecting and integrating a set of countermeasures targeting multiple attacks into an ECC design is far from trivial. Security, performance and cost need to be considered together. In this paper, we describe a g...
متن کاملError Detection Techniques Against Strong Adversaries
“Side channel” attacks (SCA) pose a serious threat on many cryptographic devices and are shown to be effective on many existing security algorithms which are in the black box model considered to be secure. These attacks are based on the key idea of recovering secret information using implementation specific side-channels. Especially active fault injection attacks are very effective in terms of ...
متن کاملSign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often employed in modern cryptographic applications. Previously, fault attacks on elliptic curves aimed to force a device to output points which are on a cryptographically weak curve. Such attacks can easily be defended against....
متن کاملDegenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models
Invalid curve attacks are a well-known class of attacks against implementations of elliptic curve cryptosystems, in which an adversary tricks the cryptographic device into carrying out scalar multiplication not on the expected secure curve, but on some other, weaker elliptic curve of his choosing. In their original form, however, these attacks only affect elliptic curve implementations using ad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015