Paper 2009/528
New Fault Attack on Elliptic Curve Scalar Multiplication
Alexey Chilikov and Oleg Taraskin
Abstract
In this report we present a new fault attack that applies to some implementations of elliptic curve scalar multiplication (ECSM). We consider the fault model with 'precise control of time', 'loose control of fault location' and 'random number of faulty bits'. We show that in this fault model the secret key can be revealed with polynomial time complexity and linear number of faults. In addition, we discuss different countermeasures to resist this attack.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- fault attackselliptic curve cryptosystemsmart cards
- Contact author(s)
- chilikov @ lostpassword com
- History
- 2009-11-02: received
- Short URL
- https://ia.cr/2009/528
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/528, author = {Alexey Chilikov and Oleg Taraskin}, title = {New Fault Attack on Elliptic Curve Scalar Multiplication}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/528}, year = {2009}, url = {https://eprint.iacr.org/2009/528} }