Cryptology ePrint Archive: Report 2009/528

New Fault Attack on Elliptic Curve Scalar Multiplication

Alexey Chilikov and Oleg Taraskin

Abstract: In this report we present a new fault attack that applies to some implementations of elliptic curve scalar multiplication (ECSM). We consider the fault model with 'precise control of time', 'loose control of fault location' and 'random number of faulty bits'. We show that in this fault model the secret key can be revealed with polynomial time complexity and linear number of faults. In addition, we discuss different countermeasures to resist this attack.

Category / Keywords: fault attacks, elliptic curve cryptosystem, smart cards

Date: received 2 Nov 2009

Contact author: chilikov at lostpassword com

Available format(s): PDF | BibTeX Citation

Version: 20091102:203943 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]