Paper 2009/528

New Fault Attack on Elliptic Curve Scalar Multiplication

Alexey Chilikov and Oleg Taraskin

Abstract

In this report we present a new fault attack that applies to some implementations of elliptic curve scalar multiplication (ECSM). We consider the fault model with 'precise control of time', 'loose control of fault location' and 'random number of faulty bits'. We show that in this fault model the secret key can be revealed with polynomial time complexity and linear number of faults. In addition, we discuss different countermeasures to resist this attack.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
fault attackselliptic curve cryptosystemsmart cards
Contact author(s)
chilikov @ lostpassword com
History
2009-11-02: received
Short URL
https://ia.cr/2009/528
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/528,
      author = {Alexey Chilikov and Oleg Taraskin},
      title = {New Fault Attack on Elliptic Curve Scalar Multiplication},
      howpublished = {Cryptology {ePrint} Archive, Paper 2009/528},
      year = {2009},
      url = {https://eprint.iacr.org/2009/528}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.