Paper 2019/400
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Akira Takahashi and Mehdi Tibouchi
Abstract
In this paper, we describe several practically exploitable fault attacks against OpenSSL's implementation of elliptic curve cryptography, related to the singular curve point decompression attacks of Blömer and Günther (FDTC2015) and the degenerate curve attacks of Neves and Tibouchi (PKC 2016).
In particular, we show that OpenSSL allows to construct EC key files containing explicit curve parameters with a compressed base point. A simple single fault injection upon loading such a file yields a full key recovery attack when the key file is used for signing with ECDSA, and a complete recovery of the plaintext when the file is used for encryption using an algorithm like ECIES. The attack is especially devastating against curves with
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. EuroS&P 2019
- Keywords
- OpenSSLElliptic curve cryptographyInvalid curve attackFault attackEmbedded securitySingular curveSupersingular curve
- Contact author(s)
-
takahashi @ cs au dk
takahashi akira 58s @ gmail com
mehdi tibouchi br @ hco ntt co jp
mehdi tibouchi @ normalesup org - History
- 2019-04-18: received
- Short URL
- https://ia.cr/2019/400
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/400, author = {Akira Takahashi and Mehdi Tibouchi}, title = {Degenerate Fault Attacks on Elliptic Curve Parameters in {OpenSSL}}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/400}, year = {2019}, url = {https://eprint.iacr.org/2019/400} }