Cryptology ePrint Archive: Report 2009/528
New Fault Attack on Elliptic Curve Scalar Multiplication
Alexey Chilikov and Oleg Taraskin
Abstract: In this report we present a new fault attack that applies to some implementations of elliptic curve scalar multiplication (ECSM). We consider the fault model with 'precise control of time', 'loose control of fault location' and 'random number of faulty bits'. We show that in this fault model the secret key can be revealed with polynomial time complexity and linear number of faults. In addition, we discuss different countermeasures to resist this attack.
Category / Keywords: fault attacks, elliptic curve cryptosystem, smart cards
Date: received 2 Nov 2009
Contact author: chilikov at lostpassword com
Available format(s): PDF | BibTeX Citation
Version: 20091102:203943 (All versions of this report)
Short URL: ia.cr/2009/528
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]