Fault Attack on elliptic curve with Montgomery ladder implementation - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2008

Fault Attack on elliptic curve with Montgomery ladder implementation

Résumé

In this paper, we present a new fault attack on elliptic curve scalar product algorithms. This attack is tailored to work on the classical Montgomery ladder method when the $y$-coordinate is not used. No weakness has been reported so far on such implementations, which are very efficient and were promoted by several authors. But taking into account the twist of the elliptic curves, we show how, with few faults (around one or two faults), we can retrieve the full secret exponent even if classical countermeasures are employed to prevent fault attacks. It turns out that this attack has not been anticipated as the security of the elliptic curve parameters in most standards can be strongly reduced. Especially, the attack is meaningful on some NIST or SECG parameters.

Dates et versions

hal-00373562 , version 1 (06-04-2009)

Identifiants

Citer

Pierre-Alain Fouque, Reynald Lercier, Denis Réal, Frédéric Valette. Fault Attack on elliptic curve with Montgomery ladder implementation. 5th Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2008, Aug 2008, Washington DC, United States. pp.92-98, ⟨10.1109/FDTC.2008.15⟩. ⟨hal-00373562⟩
11406 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More