Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks

Abstract : Fault injection attacks are a real-world threat to cryptosystems, in particular asymmetric cryptography. In this paper, we focus on countermeasures which guarantee the integrity of the computation result, hence covering most existing and future fault attacks. Namely, we study the modular extension protection scheme in previously existing and newly contributed variants of the countermeasure on elliptic curve scalar multiplication (ECSM) algorithms. We find that an existing countermeasure is incorrect and we propose new " test-free " variant of the modular extension scheme that fixes it. We then formally prove the correctness and security of modular extension: specifically, the fault non-detection probability is inversely proportional to the security parameter. Finally, we implement an ECSM protected with test-free modular extension during the elliptic curve operation to evaluate the efficient of this method on Edwards and twisted Edwards curves.
Document type :
Conference papers
Liste complète des métadonnées

Cited literature [38 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01362552
Contributor : Margaux Dugardin <>
Submitted on : Friday, September 9, 2016 - 9:50:14 AM
Last modification on : Saturday, October 27, 2018 - 1:20:27 AM
Document(s) archivé(s) le : Saturday, December 10, 2016 - 12:40:11 PM

File

PROOFS_2016_paper_1.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-01362552, version 1

Citation

Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy. Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks. PROOFS: Security Proofs for Embedded Systems 2016, Aug 2016, San, United States. ⟨hal-01362552⟩

Share

Metrics

Record views

363

Files downloads

196