Protecting Elliptic Curve Cryptography Against Fault Injection Attacks

نویسندگان

  • Sylvain Guilley
  • Gilles Barthe
  • François Dupressoir
  • Pierre-Alain Fouque
  • Benjamin Grégoire
چکیده

Context. A fault injection attack consists in modifying an intermediate value of a computation (using an electromagnetic pulse or by acting on the power supply of the circuit) and exploiting the faulted final result to gather information about the computation that would not be accessible in a correct final result. For instance, did you know that due to the simplicity of the arithmetic behind RSA, injecting a single fault in an RSA computation makes it possible to easily extract the secret key? [2] The state of the art of countermeasures consists in defining attack conditions [1] (states of the computation which lead to a faulted result exploitable by an attacker) and proving that implementations do not verify these conditions, even when faulted. Currently, there exists a bunch of different ad-hoc countermeasures of which few have been formalized (or proved). However, no systematic approaches have been developed. In the particular case of CRT-RSA, we have recently shown that existing countermeasures are effective against not only one but an arbitrary number of fault injections (up to a trivial adaptation) [4]. Some of these countermeasures were also able to thwart fault attacks that have been discovered after their publication. The particularity of these countermeasures is that they attempt to verify the integrity of the computation, in order to return the final result if and only if it is correct, thus avoiding any information leakage. The global idea behind these countermeasures is to achieve a verification in two different structures, one of which being entangled with the functional computation [3]. Therefore, an inconsistency in the redundant structure hints at a perturbation. Moreover, the mathematics employed by these protection techniques are not specific to the algorithm they protect, thus these countermeasures strategies can be applied to other cryptographic algorithms which also rely on arithmetic.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fault Attacks on Public Key Elements: Application to DLP-Based Schemes

Many cryptosystems suffer from fault attacks when implemented in physical devices such as smart cards. Fault attacks on secret key elements have successfully targeted many protocols relying on the Elliptic Curve Discrete Logarithm Problem (ECDLP), the Integer Factorization Problem (IFP) or the Discrete Logarithm Problem (DLP). More recently, faults attacks have also been designed against the pu...

متن کامل

Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security

Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. However, selecting and integrating a set of countermeasures targeting multiple attacks into an ECC design is far from trivial. Security, performance and cost need to be considered together. In this paper, we describe a g...

متن کامل

Error Detection Techniques Against Strong Adversaries

“Side channel” attacks (SCA) pose a serious threat on many cryptographic devices and are shown to be effective on many existing security algorithms which are in the black box model considered to be secure. These attacks are based on the key idea of recovering secret information using implementation specific side-channels. Especially active fault injection attacks are very effective in terms of ...

متن کامل

Sign Change Fault Attacks on Elliptic Curve Cryptosystems

We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often employed in modern cryptographic applications. Previously, fault attacks on elliptic curves aimed to force a device to output points which are on a cryptographically weak curve. Such attacks can easily be defended against....

متن کامل

Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models

Invalid curve attacks are a well-known class of attacks against implementations of elliptic curve cryptosystems, in which an adversary tricks the cryptographic device into carrying out scalar multiplication not on the expected secure curve, but on some other, weaker elliptic curve of his choosing. In their original form, however, these attacks only affect elliptic curve implementations using ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015