This report relaxes these assumptions and shows how random (and thus unknown) errors in either coordinates of point P, in the elliptic curve parameters or in the field representation enable the (partial) recovery of multiplier d. Then, from multiple point multiplications, we explain how this can be turned into a total key recovery. Simple precautions to prevent the leakage of secrets are also discussed.
Category / Keywords: implementation / Elliptic curve cryptography, fault analysis, fault attacks, physical security, information leakage. Date: received 11 Feb 2003 Contact author: marc joye at gemplus com Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20030211:170556 (All versions of this report) Discussion forum: Show discussion | Start new discussion